Jul 12 00:39:36.727303 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 12 00:39:36.727322 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Jul 11 23:15:18 -00 2025 Jul 12 00:39:36.727330 kernel: efi: EFI v2.70 by EDK II Jul 12 00:39:36.727336 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 12 00:39:36.727341 kernel: random: crng init done Jul 12 00:39:36.727346 kernel: ACPI: Early table checksum verification disabled Jul 12 00:39:36.727352 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 12 00:39:36.727359 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 12 00:39:36.727364 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727369 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727375 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727380 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727385 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727391 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727398 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727413 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727419 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 12 00:39:36.727425 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 12 00:39:36.727430 kernel: NUMA: Failed to initialise from firmware Jul 12 00:39:36.727436 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 12 00:39:36.727442 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Jul 12 00:39:36.727447 kernel: Zone ranges: Jul 12 00:39:36.727453 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 12 00:39:36.727461 kernel: DMA32 empty Jul 12 00:39:36.727466 kernel: Normal empty Jul 12 00:39:36.727472 kernel: Movable zone start for each node Jul 12 00:39:36.727477 kernel: Early memory node ranges Jul 12 00:39:36.727483 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 12 00:39:36.727489 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 12 00:39:36.727494 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 12 00:39:36.727500 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 12 00:39:36.727505 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 12 00:39:36.727511 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 12 00:39:36.727517 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 12 00:39:36.727522 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 12 00:39:36.727529 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 12 00:39:36.727535 kernel: psci: probing for conduit method from ACPI. Jul 12 00:39:36.727540 kernel: psci: PSCIv1.1 detected in firmware. Jul 12 00:39:36.727546 kernel: psci: Using standard PSCI v0.2 function IDs Jul 12 00:39:36.727551 kernel: psci: Trusted OS migration not required Jul 12 00:39:36.727559 kernel: psci: SMC Calling Convention v1.1 Jul 12 00:39:36.727566 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 12 00:39:36.727573 kernel: ACPI: SRAT not present Jul 12 00:39:36.727579 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Jul 12 00:39:36.727585 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Jul 12 00:39:36.727591 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 12 00:39:36.727597 kernel: Detected PIPT I-cache on CPU0 Jul 12 00:39:36.727603 kernel: CPU features: detected: GIC system register CPU interface Jul 12 00:39:36.727609 kernel: CPU features: detected: Hardware dirty bit management Jul 12 00:39:36.727615 kernel: CPU features: detected: Spectre-v4 Jul 12 00:39:36.727621 kernel: CPU features: detected: Spectre-BHB Jul 12 00:39:36.727628 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 12 00:39:36.727635 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 12 00:39:36.727641 kernel: CPU features: detected: ARM erratum 1418040 Jul 12 00:39:36.727647 kernel: CPU features: detected: SSBS not fully self-synchronizing Jul 12 00:39:36.727653 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 12 00:39:36.727659 kernel: Policy zone: DMA Jul 12 00:39:36.727666 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=6cb548cec1e3020e9c3dcbc1d7670f4d8bdc2e3c8e062898ccaed7fc9d588f65 Jul 12 00:39:36.727673 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 12 00:39:36.727679 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 12 00:39:36.727685 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 12 00:39:36.727691 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 12 00:39:36.727699 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7588K rodata, 36416K init, 777K bss, 114948K reserved, 0K cma-reserved) Jul 12 00:39:36.727705 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 12 00:39:36.727711 kernel: trace event string verifier disabled Jul 12 00:39:36.727717 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 12 00:39:36.727724 kernel: rcu: RCU event tracing is enabled. Jul 12 00:39:36.727747 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 12 00:39:36.727753 kernel: Trampoline variant of Tasks RCU enabled. Jul 12 00:39:36.727760 kernel: Tracing variant of Tasks RCU enabled. Jul 12 00:39:36.727766 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 12 00:39:36.727772 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 12 00:39:36.727778 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 12 00:39:36.727786 kernel: GICv3: 256 SPIs implemented Jul 12 00:39:36.727792 kernel: GICv3: 0 Extended SPIs implemented Jul 12 00:39:36.727798 kernel: GICv3: Distributor has no Range Selector support Jul 12 00:39:36.727804 kernel: Root IRQ handler: gic_handle_irq Jul 12 00:39:36.727810 kernel: GICv3: 16 PPIs implemented Jul 12 00:39:36.727816 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 12 00:39:36.727822 kernel: ACPI: SRAT not present Jul 12 00:39:36.727828 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 12 00:39:36.727834 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 12 00:39:36.727840 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 12 00:39:36.727846 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 12 00:39:36.727852 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 12 00:39:36.727860 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 12 00:39:36.727866 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 12 00:39:36.727873 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 12 00:39:36.727879 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 12 00:39:36.727885 kernel: arm-pv: using stolen time PV Jul 12 00:39:36.727891 kernel: Console: colour dummy device 80x25 Jul 12 00:39:36.727897 kernel: ACPI: Core revision 20210730 Jul 12 00:39:36.727904 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 12 00:39:36.727910 kernel: pid_max: default: 32768 minimum: 301 Jul 12 00:39:36.727916 kernel: LSM: Security Framework initializing Jul 12 00:39:36.727924 kernel: SELinux: Initializing. Jul 12 00:39:36.727930 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 12 00:39:36.727936 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 12 00:39:36.727942 kernel: rcu: Hierarchical SRCU implementation. Jul 12 00:39:36.727948 kernel: Platform MSI: ITS@0x8080000 domain created Jul 12 00:39:36.727955 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 12 00:39:36.727961 kernel: Remapping and enabling EFI services. Jul 12 00:39:36.727967 kernel: smp: Bringing up secondary CPUs ... Jul 12 00:39:36.727973 kernel: Detected PIPT I-cache on CPU1 Jul 12 00:39:36.727980 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 12 00:39:36.727987 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 12 00:39:36.727993 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 12 00:39:36.727999 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 12 00:39:36.728005 kernel: Detected PIPT I-cache on CPU2 Jul 12 00:39:36.728012 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 12 00:39:36.728018 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 12 00:39:36.728024 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 12 00:39:36.728030 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 12 00:39:36.728036 kernel: Detected PIPT I-cache on CPU3 Jul 12 00:39:36.728044 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 12 00:39:36.728050 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 12 00:39:36.728056 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 12 00:39:36.728062 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 12 00:39:36.728072 kernel: smp: Brought up 1 node, 4 CPUs Jul 12 00:39:36.728080 kernel: SMP: Total of 4 processors activated. Jul 12 00:39:36.728087 kernel: CPU features: detected: 32-bit EL0 Support Jul 12 00:39:36.728093 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 12 00:39:36.728100 kernel: CPU features: detected: Common not Private translations Jul 12 00:39:36.728106 kernel: CPU features: detected: CRC32 instructions Jul 12 00:39:36.728113 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 12 00:39:36.728119 kernel: CPU features: detected: LSE atomic instructions Jul 12 00:39:36.728127 kernel: CPU features: detected: Privileged Access Never Jul 12 00:39:36.728133 kernel: CPU features: detected: RAS Extension Support Jul 12 00:39:36.728140 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 12 00:39:36.728147 kernel: CPU: All CPU(s) started at EL1 Jul 12 00:39:36.728153 kernel: alternatives: patching kernel code Jul 12 00:39:36.728161 kernel: devtmpfs: initialized Jul 12 00:39:36.728167 kernel: KASLR enabled Jul 12 00:39:36.728174 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 12 00:39:36.728180 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 12 00:39:36.728187 kernel: pinctrl core: initialized pinctrl subsystem Jul 12 00:39:36.728194 kernel: SMBIOS 3.0.0 present. Jul 12 00:39:36.728200 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 12 00:39:36.728207 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 12 00:39:36.728213 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 12 00:39:36.728221 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 12 00:39:36.728228 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 12 00:39:36.728234 kernel: audit: initializing netlink subsys (disabled) Jul 12 00:39:36.728241 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Jul 12 00:39:36.728247 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 12 00:39:36.728254 kernel: cpuidle: using governor menu Jul 12 00:39:36.728260 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 12 00:39:36.728267 kernel: ASID allocator initialised with 32768 entries Jul 12 00:39:36.728273 kernel: ACPI: bus type PCI registered Jul 12 00:39:36.728281 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 12 00:39:36.728287 kernel: Serial: AMBA PL011 UART driver Jul 12 00:39:36.728294 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 12 00:39:36.728300 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 12 00:39:36.728307 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 12 00:39:36.728314 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 12 00:39:36.728320 kernel: cryptd: max_cpu_qlen set to 1000 Jul 12 00:39:36.728327 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 12 00:39:36.728333 kernel: ACPI: Added _OSI(Module Device) Jul 12 00:39:36.728341 kernel: ACPI: Added _OSI(Processor Device) Jul 12 00:39:36.728347 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 12 00:39:36.728354 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 12 00:39:36.728361 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 12 00:39:36.728367 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 12 00:39:36.728374 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 12 00:39:36.728380 kernel: ACPI: Interpreter enabled Jul 12 00:39:36.728386 kernel: ACPI: Using GIC for interrupt routing Jul 12 00:39:36.728393 kernel: ACPI: MCFG table detected, 1 entries Jul 12 00:39:36.728406 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 12 00:39:36.728414 kernel: printk: console [ttyAMA0] enabled Jul 12 00:39:36.728420 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 12 00:39:36.728542 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 12 00:39:36.728603 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 12 00:39:36.728662 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 12 00:39:36.728750 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 12 00:39:36.728818 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 12 00:39:36.728827 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 12 00:39:36.728834 kernel: PCI host bridge to bus 0000:00 Jul 12 00:39:36.728899 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 12 00:39:36.728953 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 12 00:39:36.729005 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 12 00:39:36.729056 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 12 00:39:36.729129 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 12 00:39:36.729202 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 12 00:39:36.729264 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 12 00:39:36.729322 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 12 00:39:36.729381 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 12 00:39:36.729453 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 12 00:39:36.729515 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 12 00:39:36.729579 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 12 00:39:36.729632 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 12 00:39:36.729684 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 12 00:39:36.729744 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 12 00:39:36.729753 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 12 00:39:36.729760 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 12 00:39:36.729767 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 12 00:39:36.729776 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 12 00:39:36.729782 kernel: iommu: Default domain type: Translated Jul 12 00:39:36.729789 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 12 00:39:36.729796 kernel: vgaarb: loaded Jul 12 00:39:36.729802 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 12 00:39:36.729809 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 12 00:39:36.729815 kernel: PTP clock support registered Jul 12 00:39:36.729822 kernel: Registered efivars operations Jul 12 00:39:36.729828 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 12 00:39:36.729835 kernel: VFS: Disk quotas dquot_6.6.0 Jul 12 00:39:36.729843 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 12 00:39:36.729849 kernel: pnp: PnP ACPI init Jul 12 00:39:36.729914 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 12 00:39:36.729923 kernel: pnp: PnP ACPI: found 1 devices Jul 12 00:39:36.729930 kernel: NET: Registered PF_INET protocol family Jul 12 00:39:36.729936 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 12 00:39:36.729943 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 12 00:39:36.729950 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 12 00:39:36.729958 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 12 00:39:36.729965 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 12 00:39:36.729971 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 12 00:39:36.729978 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 12 00:39:36.729984 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 12 00:39:36.729991 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 12 00:39:36.729997 kernel: PCI: CLS 0 bytes, default 64 Jul 12 00:39:36.730007 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 12 00:39:36.730013 kernel: kvm [1]: HYP mode not available Jul 12 00:39:36.730021 kernel: Initialise system trusted keyrings Jul 12 00:39:36.730028 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 12 00:39:36.730034 kernel: Key type asymmetric registered Jul 12 00:39:36.730040 kernel: Asymmetric key parser 'x509' registered Jul 12 00:39:36.730047 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 12 00:39:36.730054 kernel: io scheduler mq-deadline registered Jul 12 00:39:36.730060 kernel: io scheduler kyber registered Jul 12 00:39:36.730067 kernel: io scheduler bfq registered Jul 12 00:39:36.730074 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 12 00:39:36.730081 kernel: ACPI: button: Power Button [PWRB] Jul 12 00:39:36.730088 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 12 00:39:36.730148 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 12 00:39:36.730157 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 12 00:39:36.730164 kernel: thunder_xcv, ver 1.0 Jul 12 00:39:36.730170 kernel: thunder_bgx, ver 1.0 Jul 12 00:39:36.730176 kernel: nicpf, ver 1.0 Jul 12 00:39:36.730183 kernel: nicvf, ver 1.0 Jul 12 00:39:36.730250 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 12 00:39:36.730308 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-07-12T00:39:36 UTC (1752280776) Jul 12 00:39:36.730316 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 12 00:39:36.730323 kernel: NET: Registered PF_INET6 protocol family Jul 12 00:39:36.730329 kernel: Segment Routing with IPv6 Jul 12 00:39:36.730336 kernel: In-situ OAM (IOAM) with IPv6 Jul 12 00:39:36.730342 kernel: NET: Registered PF_PACKET protocol family Jul 12 00:39:36.730349 kernel: Key type dns_resolver registered Jul 12 00:39:36.730355 kernel: registered taskstats version 1 Jul 12 00:39:36.730363 kernel: Loading compiled-in X.509 certificates Jul 12 00:39:36.730370 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: de2ee1d04443f96c763927c453375bbe23b5752a' Jul 12 00:39:36.730377 kernel: Key type .fscrypt registered Jul 12 00:39:36.730383 kernel: Key type fscrypt-provisioning registered Jul 12 00:39:36.730390 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 12 00:39:36.730396 kernel: ima: Allocated hash algorithm: sha1 Jul 12 00:39:36.730409 kernel: ima: No architecture policies found Jul 12 00:39:36.730416 kernel: clk: Disabling unused clocks Jul 12 00:39:36.730422 kernel: Freeing unused kernel memory: 36416K Jul 12 00:39:36.730431 kernel: Run /init as init process Jul 12 00:39:36.730437 kernel: with arguments: Jul 12 00:39:36.730444 kernel: /init Jul 12 00:39:36.730450 kernel: with environment: Jul 12 00:39:36.730456 kernel: HOME=/ Jul 12 00:39:36.730463 kernel: TERM=linux Jul 12 00:39:36.730469 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 12 00:39:36.730477 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 12 00:39:36.730487 systemd[1]: Detected virtualization kvm. Jul 12 00:39:36.730494 systemd[1]: Detected architecture arm64. Jul 12 00:39:36.730501 systemd[1]: Running in initrd. Jul 12 00:39:36.730507 systemd[1]: No hostname configured, using default hostname. Jul 12 00:39:36.730514 systemd[1]: Hostname set to . Jul 12 00:39:36.730521 systemd[1]: Initializing machine ID from VM UUID. Jul 12 00:39:36.730528 systemd[1]: Queued start job for default target initrd.target. Jul 12 00:39:36.730535 systemd[1]: Started systemd-ask-password-console.path. Jul 12 00:39:36.730543 systemd[1]: Reached target cryptsetup.target. Jul 12 00:39:36.730550 systemd[1]: Reached target paths.target. Jul 12 00:39:36.730557 systemd[1]: Reached target slices.target. Jul 12 00:39:36.730564 systemd[1]: Reached target swap.target. Jul 12 00:39:36.730570 systemd[1]: Reached target timers.target. Jul 12 00:39:36.730578 systemd[1]: Listening on iscsid.socket. Jul 12 00:39:36.730585 systemd[1]: Listening on iscsiuio.socket. Jul 12 00:39:36.730593 systemd[1]: Listening on systemd-journald-audit.socket. Jul 12 00:39:36.730600 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 12 00:39:36.730607 systemd[1]: Listening on systemd-journald.socket. Jul 12 00:39:36.730614 systemd[1]: Listening on systemd-networkd.socket. Jul 12 00:39:36.730621 systemd[1]: Listening on systemd-udevd-control.socket. Jul 12 00:39:36.730627 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 12 00:39:36.730634 systemd[1]: Reached target sockets.target. Jul 12 00:39:36.730641 systemd[1]: Starting kmod-static-nodes.service... Jul 12 00:39:36.730648 systemd[1]: Finished network-cleanup.service. Jul 12 00:39:36.730656 systemd[1]: Starting systemd-fsck-usr.service... Jul 12 00:39:36.730663 systemd[1]: Starting systemd-journald.service... Jul 12 00:39:36.730670 systemd[1]: Starting systemd-modules-load.service... Jul 12 00:39:36.730676 systemd[1]: Starting systemd-resolved.service... Jul 12 00:39:36.730683 systemd[1]: Starting systemd-vconsole-setup.service... Jul 12 00:39:36.730690 systemd[1]: Finished kmod-static-nodes.service. Jul 12 00:39:36.730697 systemd[1]: Finished systemd-fsck-usr.service. Jul 12 00:39:36.730704 systemd[1]: Finished systemd-vconsole-setup.service. Jul 12 00:39:36.730710 systemd[1]: Starting dracut-cmdline-ask.service... Jul 12 00:39:36.730719 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 12 00:39:36.730735 systemd-journald[289]: Journal started Jul 12 00:39:36.730775 systemd-journald[289]: Runtime Journal (/run/log/journal/8a93b14c8aa54d2e97cecb4df9d9a862) is 6.0M, max 48.7M, 42.6M free. Jul 12 00:39:36.721405 systemd-modules-load[290]: Inserted module 'overlay' Jul 12 00:39:36.732964 systemd[1]: Started systemd-journald.service. Jul 12 00:39:36.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.737995 kernel: audit: type=1130 audit(1752280776.732:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.738028 kernel: audit: type=1130 audit(1752280776.736:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.735680 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 12 00:39:36.744740 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 12 00:39:36.746957 systemd[1]: Finished dracut-cmdline-ask.service. Jul 12 00:39:36.751163 kernel: audit: type=1130 audit(1752280776.746:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.751182 kernel: Bridge firewalling registered Jul 12 00:39:36.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.749447 systemd-resolved[291]: Positive Trust Anchors: Jul 12 00:39:36.749454 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 12 00:39:36.749481 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 12 00:39:36.751179 systemd-modules-load[290]: Inserted module 'br_netfilter' Jul 12 00:39:36.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.751394 systemd[1]: Starting dracut-cmdline.service... Jul 12 00:39:36.765690 kernel: audit: type=1130 audit(1752280776.760:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.765714 kernel: SCSI subsystem initialized Jul 12 00:39:36.765819 dracut-cmdline[306]: dracut-dracut-053 Jul 12 00:39:36.753599 systemd-resolved[291]: Defaulting to hostname 'linux'. Jul 12 00:39:36.755059 systemd[1]: Started systemd-resolved.service. Jul 12 00:39:36.768050 dracut-cmdline[306]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=6cb548cec1e3020e9c3dcbc1d7670f4d8bdc2e3c8e062898ccaed7fc9d588f65 Jul 12 00:39:36.761680 systemd[1]: Reached target nss-lookup.target. Jul 12 00:39:36.774761 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 12 00:39:36.774802 kernel: device-mapper: uevent: version 1.0.3 Jul 12 00:39:36.776747 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 12 00:39:36.778310 systemd-modules-load[290]: Inserted module 'dm_multipath' Jul 12 00:39:36.779438 systemd[1]: Finished systemd-modules-load.service. Jul 12 00:39:36.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.781038 systemd[1]: Starting systemd-sysctl.service... Jul 12 00:39:36.784500 kernel: audit: type=1130 audit(1752280776.779:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.790386 systemd[1]: Finished systemd-sysctl.service. Jul 12 00:39:36.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.794752 kernel: audit: type=1130 audit(1752280776.790:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.830763 kernel: Loading iSCSI transport class v2.0-870. Jul 12 00:39:36.843767 kernel: iscsi: registered transport (tcp) Jul 12 00:39:36.865843 kernel: iscsi: registered transport (qla4xxx) Jul 12 00:39:36.865877 kernel: QLogic iSCSI HBA Driver Jul 12 00:39:36.902268 systemd[1]: Finished dracut-cmdline.service. Jul 12 00:39:36.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.903941 systemd[1]: Starting dracut-pre-udev.service... Jul 12 00:39:36.907159 kernel: audit: type=1130 audit(1752280776.902:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:36.952768 kernel: raid6: neonx8 gen() 12442 MB/s Jul 12 00:39:36.969758 kernel: raid6: neonx8 xor() 10029 MB/s Jul 12 00:39:36.986759 kernel: raid6: neonx4 gen() 11818 MB/s Jul 12 00:39:37.003756 kernel: raid6: neonx4 xor() 10861 MB/s Jul 12 00:39:37.020752 kernel: raid6: neonx2 gen() 13006 MB/s Jul 12 00:39:37.037749 kernel: raid6: neonx2 xor() 10377 MB/s Jul 12 00:39:37.054753 kernel: raid6: neonx1 gen() 10571 MB/s Jul 12 00:39:37.071749 kernel: raid6: neonx1 xor() 8772 MB/s Jul 12 00:39:37.088750 kernel: raid6: int64x8 gen() 6265 MB/s Jul 12 00:39:37.105748 kernel: raid6: int64x8 xor() 3541 MB/s Jul 12 00:39:37.122747 kernel: raid6: int64x4 gen() 7198 MB/s Jul 12 00:39:37.139746 kernel: raid6: int64x4 xor() 3851 MB/s Jul 12 00:39:37.156755 kernel: raid6: int64x2 gen() 6123 MB/s Jul 12 00:39:37.173751 kernel: raid6: int64x2 xor() 3347 MB/s Jul 12 00:39:37.190748 kernel: raid6: int64x1 gen() 5039 MB/s Jul 12 00:39:37.207785 kernel: raid6: int64x1 xor() 2633 MB/s Jul 12 00:39:37.207803 kernel: raid6: using algorithm neonx2 gen() 13006 MB/s Jul 12 00:39:37.207812 kernel: raid6: .... xor() 10377 MB/s, rmw enabled Jul 12 00:39:37.208840 kernel: raid6: using neon recovery algorithm Jul 12 00:39:37.218752 kernel: xor: measuring software checksum speed Jul 12 00:39:37.220051 kernel: 8regs : 15231 MB/sec Jul 12 00:39:37.220062 kernel: 32regs : 19750 MB/sec Jul 12 00:39:37.221257 kernel: arm64_neon : 27654 MB/sec Jul 12 00:39:37.221280 kernel: xor: using function: arm64_neon (27654 MB/sec) Jul 12 00:39:37.275750 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 12 00:39:37.285430 systemd[1]: Finished dracut-pre-udev.service. Jul 12 00:39:37.289801 kernel: audit: type=1130 audit(1752280777.286:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:37.289826 kernel: audit: type=1334 audit(1752280777.288:10): prog-id=7 op=LOAD Jul 12 00:39:37.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:37.288000 audit: BPF prog-id=7 op=LOAD Jul 12 00:39:37.289000 audit: BPF prog-id=8 op=LOAD Jul 12 00:39:37.290146 systemd[1]: Starting systemd-udevd.service... Jul 12 00:39:37.304128 systemd-udevd[489]: Using default interface naming scheme 'v252'. Jul 12 00:39:37.307450 systemd[1]: Started systemd-udevd.service. Jul 12 00:39:37.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:37.309633 systemd[1]: Starting dracut-pre-trigger.service... Jul 12 00:39:37.319868 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Jul 12 00:39:37.345846 systemd[1]: Finished dracut-pre-trigger.service. Jul 12 00:39:37.347341 systemd[1]: Starting systemd-udev-trigger.service... Jul 12 00:39:37.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:37.381925 systemd[1]: Finished systemd-udev-trigger.service. Jul 12 00:39:37.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:37.416467 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 12 00:39:37.421571 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 12 00:39:37.421585 kernel: GPT:9289727 != 19775487 Jul 12 00:39:37.421599 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 12 00:39:37.421607 kernel: GPT:9289727 != 19775487 Jul 12 00:39:37.421615 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 12 00:39:37.421623 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 12 00:39:37.430761 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by (udev-worker) (547) Jul 12 00:39:37.433842 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 12 00:39:37.440792 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 12 00:39:37.443619 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 12 00:39:37.444606 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 12 00:39:37.448792 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 12 00:39:37.450374 systemd[1]: Starting disk-uuid.service... Jul 12 00:39:37.456140 disk-uuid[561]: Primary Header is updated. Jul 12 00:39:37.456140 disk-uuid[561]: Secondary Entries is updated. Jul 12 00:39:37.456140 disk-uuid[561]: Secondary Header is updated. Jul 12 00:39:37.459243 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 12 00:39:37.467756 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 12 00:39:37.470753 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 12 00:39:38.471557 disk-uuid[562]: The operation has completed successfully. Jul 12 00:39:38.472802 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 12 00:39:38.493983 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 12 00:39:38.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.494089 systemd[1]: Finished disk-uuid.service. Jul 12 00:39:38.495681 systemd[1]: Starting verity-setup.service... Jul 12 00:39:38.511751 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 12 00:39:38.533039 systemd[1]: Found device dev-mapper-usr.device. Jul 12 00:39:38.534701 systemd[1]: Mounting sysusr-usr.mount... Jul 12 00:39:38.535515 systemd[1]: Finished verity-setup.service. Jul 12 00:39:38.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.587621 systemd[1]: Mounted sysusr-usr.mount. Jul 12 00:39:38.588945 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 12 00:39:38.588501 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 12 00:39:38.589218 systemd[1]: Starting ignition-setup.service... Jul 12 00:39:38.591512 systemd[1]: Starting parse-ip-for-networkd.service... Jul 12 00:39:38.598303 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 12 00:39:38.598341 kernel: BTRFS info (device vda6): using free space tree Jul 12 00:39:38.598351 kernel: BTRFS info (device vda6): has skinny extents Jul 12 00:39:38.606499 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 12 00:39:38.612670 systemd[1]: Finished ignition-setup.service. Jul 12 00:39:38.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.614379 systemd[1]: Starting ignition-fetch-offline.service... Jul 12 00:39:38.678273 systemd[1]: Finished parse-ip-for-networkd.service. Jul 12 00:39:38.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.679000 audit: BPF prog-id=9 op=LOAD Jul 12 00:39:38.680307 systemd[1]: Starting systemd-networkd.service... Jul 12 00:39:38.701810 ignition[649]: Ignition 2.14.0 Jul 12 00:39:38.701820 ignition[649]: Stage: fetch-offline Jul 12 00:39:38.701855 ignition[649]: no configs at "/usr/lib/ignition/base.d" Jul 12 00:39:38.701863 ignition[649]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 12 00:39:38.701992 ignition[649]: parsed url from cmdline: "" Jul 12 00:39:38.701996 ignition[649]: no config URL provided Jul 12 00:39:38.702000 ignition[649]: reading system config file "/usr/lib/ignition/user.ign" Jul 12 00:39:38.702008 ignition[649]: no config at "/usr/lib/ignition/user.ign" Jul 12 00:39:38.706490 systemd-networkd[740]: lo: Link UP Jul 12 00:39:38.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.702025 ignition[649]: op(1): [started] loading QEMU firmware config module Jul 12 00:39:38.706494 systemd-networkd[740]: lo: Gained carrier Jul 12 00:39:38.702034 ignition[649]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 12 00:39:38.706911 systemd-networkd[740]: Enumeration completed Jul 12 00:39:38.706112 ignition[649]: op(1): [finished] loading QEMU firmware config module Jul 12 00:39:38.707087 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 12 00:39:38.707219 systemd[1]: Started systemd-networkd.service. Jul 12 00:39:38.708137 systemd-networkd[740]: eth0: Link UP Jul 12 00:39:38.708140 systemd-networkd[740]: eth0: Gained carrier Jul 12 00:39:38.709231 systemd[1]: Reached target network.target. Jul 12 00:39:38.711181 systemd[1]: Starting iscsiuio.service... Jul 12 00:39:38.721266 ignition[649]: parsing config with SHA512: 2b054422d737928a8808928acf8bb886a380089a961b83b798ee68ad383b3340ae4cfe6daea179ae3f97a27abbde26760f7a2e1d7ad833299486c212d137658b Jul 12 00:39:38.722450 systemd[1]: Started iscsiuio.service. Jul 12 00:39:38.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.724098 systemd[1]: Starting iscsid.service... Jul 12 00:39:38.726865 unknown[649]: fetched base config from "system" Jul 12 00:39:38.726882 unknown[649]: fetched user config from "qemu" Jul 12 00:39:38.727790 ignition[649]: fetch-offline: fetch-offline passed Jul 12 00:39:38.729170 iscsid[747]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 12 00:39:38.729170 iscsid[747]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 12 00:39:38.729170 iscsid[747]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 12 00:39:38.729170 iscsid[747]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 12 00:39:38.729170 iscsid[747]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 12 00:39:38.729170 iscsid[747]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 12 00:39:38.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.727875 ignition[649]: Ignition finished successfully Jul 12 00:39:38.728820 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.137/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 12 00:39:38.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.730586 systemd[1]: Started iscsid.service. Jul 12 00:39:38.731485 systemd[1]: Finished ignition-fetch-offline.service. Jul 12 00:39:38.733122 systemd[1]: Starting dracut-initqueue.service... Jul 12 00:39:38.748694 ignition[751]: Ignition 2.14.0 Jul 12 00:39:38.737895 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 12 00:39:38.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.748700 ignition[751]: Stage: kargs Jul 12 00:39:38.738688 systemd[1]: Starting ignition-kargs.service... Jul 12 00:39:38.748801 ignition[751]: no configs at "/usr/lib/ignition/base.d" Jul 12 00:39:38.745221 systemd[1]: Finished dracut-initqueue.service. Jul 12 00:39:38.748810 ignition[751]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 12 00:39:38.746087 systemd[1]: Reached target remote-fs-pre.target. Jul 12 00:39:38.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.749444 ignition[751]: kargs: kargs passed Jul 12 00:39:38.747568 systemd[1]: Reached target remote-cryptsetup.target. Jul 12 00:39:38.749485 ignition[751]: Ignition finished successfully Jul 12 00:39:38.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.749277 systemd[1]: Reached target remote-fs.target. Jul 12 00:39:38.759431 ignition[763]: Ignition 2.14.0 Jul 12 00:39:38.750724 systemd[1]: Starting dracut-pre-mount.service... Jul 12 00:39:38.759436 ignition[763]: Stage: disks Jul 12 00:39:38.751605 systemd[1]: Finished ignition-kargs.service. Jul 12 00:39:38.759524 ignition[763]: no configs at "/usr/lib/ignition/base.d" Jul 12 00:39:38.753258 systemd[1]: Starting ignition-disks.service... Jul 12 00:39:38.759533 ignition[763]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 12 00:39:38.758247 systemd[1]: Finished dracut-pre-mount.service. Jul 12 00:39:38.760270 ignition[763]: disks: disks passed Jul 12 00:39:38.761047 systemd[1]: Finished ignition-disks.service. Jul 12 00:39:38.760308 ignition[763]: Ignition finished successfully Jul 12 00:39:38.762146 systemd[1]: Reached target initrd-root-device.target. Jul 12 00:39:38.763422 systemd[1]: Reached target local-fs-pre.target. Jul 12 00:39:38.764669 systemd[1]: Reached target local-fs.target. Jul 12 00:39:38.765816 systemd[1]: Reached target sysinit.target. Jul 12 00:39:38.767062 systemd[1]: Reached target basic.target. Jul 12 00:39:38.768977 systemd[1]: Starting systemd-fsck-root.service... Jul 12 00:39:38.780508 systemd-fsck[776]: ROOT: clean, 619/553520 files, 56022/553472 blocks Jul 12 00:39:38.783866 systemd[1]: Finished systemd-fsck-root.service. Jul 12 00:39:38.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.785482 systemd[1]: Mounting sysroot.mount... Jul 12 00:39:38.790763 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 12 00:39:38.791074 systemd[1]: Mounted sysroot.mount. Jul 12 00:39:38.791814 systemd[1]: Reached target initrd-root-fs.target. Jul 12 00:39:38.794005 systemd[1]: Mounting sysroot-usr.mount... Jul 12 00:39:38.794922 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 12 00:39:38.794962 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 12 00:39:38.794990 systemd[1]: Reached target ignition-diskful.target. Jul 12 00:39:38.797066 systemd[1]: Mounted sysroot-usr.mount. Jul 12 00:39:38.798887 systemd[1]: Starting initrd-setup-root.service... Jul 12 00:39:38.803324 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory Jul 12 00:39:38.808020 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Jul 12 00:39:38.812077 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory Jul 12 00:39:38.816451 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory Jul 12 00:39:38.843054 systemd[1]: Finished initrd-setup-root.service. Jul 12 00:39:38.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.844642 systemd[1]: Starting ignition-mount.service... Jul 12 00:39:38.845984 systemd[1]: Starting sysroot-boot.service... Jul 12 00:39:38.850197 bash[827]: umount: /sysroot/usr/share/oem: not mounted. Jul 12 00:39:38.858816 ignition[829]: INFO : Ignition 2.14.0 Jul 12 00:39:38.858816 ignition[829]: INFO : Stage: mount Jul 12 00:39:38.860677 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 12 00:39:38.860677 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 12 00:39:38.860677 ignition[829]: INFO : mount: mount passed Jul 12 00:39:38.860677 ignition[829]: INFO : Ignition finished successfully Jul 12 00:39:38.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.861071 systemd[1]: Finished ignition-mount.service. Jul 12 00:39:38.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:38.865417 systemd[1]: Finished sysroot-boot.service. Jul 12 00:39:39.542512 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 12 00:39:39.549005 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (838) Jul 12 00:39:39.549034 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 12 00:39:39.549044 kernel: BTRFS info (device vda6): using free space tree Jul 12 00:39:39.550180 kernel: BTRFS info (device vda6): has skinny extents Jul 12 00:39:39.552843 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 12 00:39:39.554299 systemd[1]: Starting ignition-files.service... Jul 12 00:39:39.567599 ignition[858]: INFO : Ignition 2.14.0 Jul 12 00:39:39.567599 ignition[858]: INFO : Stage: files Jul 12 00:39:39.569096 ignition[858]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 12 00:39:39.569096 ignition[858]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 12 00:39:39.569096 ignition[858]: DEBUG : files: compiled without relabeling support, skipping Jul 12 00:39:39.572275 ignition[858]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 12 00:39:39.572275 ignition[858]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 12 00:39:39.576299 ignition[858]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 12 00:39:39.577560 ignition[858]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 12 00:39:39.577560 ignition[858]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 12 00:39:39.577560 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 12 00:39:39.576983 unknown[858]: wrote ssh authorized keys file for user: core Jul 12 00:39:39.582645 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 12 00:39:39.582645 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 12 00:39:39.582645 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 12 00:39:39.582645 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 12 00:39:39.582645 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 12 00:39:39.582645 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 12 00:39:39.582645 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 Jul 12 00:39:40.048959 systemd-networkd[740]: eth0: Gained IPv6LL Jul 12 00:39:40.062396 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 12 00:39:40.527399 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Jul 12 00:39:40.529735 ignition[858]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 12 00:39:40.529735 ignition[858]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 12 00:39:40.529735 ignition[858]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 12 00:39:40.529735 ignition[858]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 12 00:39:40.529735 ignition[858]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 12 00:39:40.529735 ignition[858]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 12 00:39:40.559052 ignition[858]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 12 00:39:40.561421 ignition[858]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 12 00:39:40.561421 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 12 00:39:40.561421 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 12 00:39:40.561421 ignition[858]: INFO : files: files passed Jul 12 00:39:40.561421 ignition[858]: INFO : Ignition finished successfully Jul 12 00:39:40.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.561599 systemd[1]: Finished ignition-files.service. Jul 12 00:39:40.564369 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 12 00:39:40.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.571797 initrd-setup-root-after-ignition[883]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 12 00:39:40.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.565640 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 12 00:39:40.576038 initrd-setup-root-after-ignition[886]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 12 00:39:40.566258 systemd[1]: Starting ignition-quench.service... Jul 12 00:39:40.570045 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 12 00:39:40.570127 systemd[1]: Finished ignition-quench.service. Jul 12 00:39:40.571178 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 12 00:39:40.572654 systemd[1]: Reached target ignition-complete.target. Jul 12 00:39:40.575050 systemd[1]: Starting initrd-parse-etc.service... Jul 12 00:39:40.590959 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 12 00:39:40.591063 systemd[1]: Finished initrd-parse-etc.service. Jul 12 00:39:40.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.592708 systemd[1]: Reached target initrd-fs.target. Jul 12 00:39:40.593826 systemd[1]: Reached target initrd.target. Jul 12 00:39:40.595027 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 12 00:39:40.595812 systemd[1]: Starting dracut-pre-pivot.service... Jul 12 00:39:40.607409 systemd[1]: Finished dracut-pre-pivot.service. Jul 12 00:39:40.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.609078 systemd[1]: Starting initrd-cleanup.service... Jul 12 00:39:40.617535 systemd[1]: Stopped target nss-lookup.target. Jul 12 00:39:40.618454 systemd[1]: Stopped target remote-cryptsetup.target. Jul 12 00:39:40.619814 systemd[1]: Stopped target timers.target. Jul 12 00:39:40.621109 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 12 00:39:40.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.621216 systemd[1]: Stopped dracut-pre-pivot.service. Jul 12 00:39:40.622525 systemd[1]: Stopped target initrd.target. Jul 12 00:39:40.623851 systemd[1]: Stopped target basic.target. Jul 12 00:39:40.625090 systemd[1]: Stopped target ignition-complete.target. Jul 12 00:39:40.626406 systemd[1]: Stopped target ignition-diskful.target. Jul 12 00:39:40.627667 systemd[1]: Stopped target initrd-root-device.target. Jul 12 00:39:40.629093 systemd[1]: Stopped target remote-fs.target. Jul 12 00:39:40.630417 systemd[1]: Stopped target remote-fs-pre.target. Jul 12 00:39:40.631762 systemd[1]: Stopped target sysinit.target. Jul 12 00:39:40.632948 systemd[1]: Stopped target local-fs.target. Jul 12 00:39:40.634189 systemd[1]: Stopped target local-fs-pre.target. Jul 12 00:39:40.635426 systemd[1]: Stopped target swap.target. Jul 12 00:39:40.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.636531 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 12 00:39:40.636635 systemd[1]: Stopped dracut-pre-mount.service. Jul 12 00:39:40.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.637899 systemd[1]: Stopped target cryptsetup.target. Jul 12 00:39:40.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.639050 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 12 00:39:40.639149 systemd[1]: Stopped dracut-initqueue.service. Jul 12 00:39:40.640593 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 12 00:39:40.640688 systemd[1]: Stopped ignition-fetch-offline.service. Jul 12 00:39:40.641993 systemd[1]: Stopped target paths.target. Jul 12 00:39:40.643175 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 12 00:39:40.647776 systemd[1]: Stopped systemd-ask-password-console.path. Jul 12 00:39:40.649023 systemd[1]: Stopped target slices.target. Jul 12 00:39:40.650374 systemd[1]: Stopped target sockets.target. Jul 12 00:39:40.651623 systemd[1]: iscsid.socket: Deactivated successfully. Jul 12 00:39:40.651695 systemd[1]: Closed iscsid.socket. Jul 12 00:39:40.652834 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 12 00:39:40.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.652899 systemd[1]: Closed iscsiuio.socket. Jul 12 00:39:40.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.654156 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 12 00:39:40.654254 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 12 00:39:40.655528 systemd[1]: ignition-files.service: Deactivated successfully. Jul 12 00:39:40.655625 systemd[1]: Stopped ignition-files.service. Jul 12 00:39:40.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.657692 systemd[1]: Stopping ignition-mount.service... Jul 12 00:39:40.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.659754 systemd[1]: Stopping sysroot-boot.service... Jul 12 00:39:40.660411 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 12 00:39:40.660533 systemd[1]: Stopped systemd-udev-trigger.service. Jul 12 00:39:40.662800 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 12 00:39:40.669041 ignition[899]: INFO : Ignition 2.14.0 Jul 12 00:39:40.669041 ignition[899]: INFO : Stage: umount Jul 12 00:39:40.669041 ignition[899]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 12 00:39:40.669041 ignition[899]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 12 00:39:40.669041 ignition[899]: INFO : umount: umount passed Jul 12 00:39:40.669041 ignition[899]: INFO : Ignition finished successfully Jul 12 00:39:40.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.662893 systemd[1]: Stopped dracut-pre-trigger.service. Jul 12 00:39:40.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.668539 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 12 00:39:40.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.668623 systemd[1]: Finished initrd-cleanup.service. Jul 12 00:39:40.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.670651 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 12 00:39:40.671070 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 12 00:39:40.671160 systemd[1]: Stopped ignition-mount.service. Jul 12 00:39:40.672196 systemd[1]: Stopped target network.target. Jul 12 00:39:40.673563 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 12 00:39:40.673619 systemd[1]: Stopped ignition-disks.service. Jul 12 00:39:40.677123 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 12 00:39:40.677166 systemd[1]: Stopped ignition-kargs.service. Jul 12 00:39:40.678427 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 12 00:39:40.678465 systemd[1]: Stopped ignition-setup.service. Jul 12 00:39:40.679986 systemd[1]: Stopping systemd-networkd.service... Jul 12 00:39:40.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.681562 systemd[1]: Stopping systemd-resolved.service... Jul 12 00:39:40.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.687952 systemd-networkd[740]: eth0: DHCPv6 lease lost Jul 12 00:39:40.689933 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 12 00:39:40.690034 systemd[1]: Stopped systemd-networkd.service. Jul 12 00:39:40.692419 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 12 00:39:40.699000 audit: BPF prog-id=9 op=UNLOAD Jul 12 00:39:40.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.692512 systemd[1]: Stopped systemd-resolved.service. Jul 12 00:39:40.694006 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 12 00:39:40.701000 audit: BPF prog-id=6 op=UNLOAD Jul 12 00:39:40.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.694033 systemd[1]: Closed systemd-networkd.socket. Jul 12 00:39:40.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.696664 systemd[1]: Stopping network-cleanup.service... Jul 12 00:39:40.697555 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 12 00:39:40.697622 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 12 00:39:40.699292 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 12 00:39:40.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.699336 systemd[1]: Stopped systemd-sysctl.service. Jul 12 00:39:40.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.702649 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 12 00:39:40.702692 systemd[1]: Stopped systemd-modules-load.service. Jul 12 00:39:40.703770 systemd[1]: Stopping systemd-udevd.service... Jul 12 00:39:40.709134 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 12 00:39:40.709633 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 12 00:39:40.709717 systemd[1]: Stopped sysroot-boot.service. Jul 12 00:39:40.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.711199 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 12 00:39:40.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.711247 systemd[1]: Stopped initrd-setup-root.service. Jul 12 00:39:40.716486 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 12 00:39:40.716618 systemd[1]: Stopped systemd-udevd.service. Jul 12 00:39:40.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.718175 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 12 00:39:40.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.718245 systemd[1]: Stopped network-cleanup.service. Jul 12 00:39:40.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.719298 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 12 00:39:40.719334 systemd[1]: Closed systemd-udevd-control.socket. Jul 12 00:39:40.720669 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 12 00:39:40.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.720703 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 12 00:39:40.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.721957 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 12 00:39:40.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.722003 systemd[1]: Stopped dracut-pre-udev.service. Jul 12 00:39:40.723355 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 12 00:39:40.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.723408 systemd[1]: Stopped dracut-cmdline.service. Jul 12 00:39:40.724577 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 12 00:39:40.724614 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 12 00:39:40.726835 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 12 00:39:40.728314 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 12 00:39:40.728372 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 12 00:39:40.730560 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 12 00:39:40.730597 systemd[1]: Stopped kmod-static-nodes.service. Jul 12 00:39:40.731404 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 12 00:39:40.731448 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 12 00:39:40.733698 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 12 00:39:40.734119 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 12 00:39:40.734196 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 12 00:39:40.735472 systemd[1]: Reached target initrd-switch-root.target. Jul 12 00:39:40.739412 systemd[1]: Starting initrd-switch-root.service... Jul 12 00:39:40.746121 systemd[1]: Switching root. Jul 12 00:39:40.766323 iscsid[747]: iscsid shutting down. Jul 12 00:39:40.767019 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). Jul 12 00:39:40.767052 systemd-journald[289]: Journal stopped Jul 12 00:39:42.796478 kernel: SELinux: Class mctp_socket not defined in policy. Jul 12 00:39:42.796534 kernel: SELinux: Class anon_inode not defined in policy. Jul 12 00:39:42.796547 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 12 00:39:42.796561 kernel: SELinux: policy capability network_peer_controls=1 Jul 12 00:39:42.796573 kernel: SELinux: policy capability open_perms=1 Jul 12 00:39:42.796583 kernel: SELinux: policy capability extended_socket_class=1 Jul 12 00:39:42.796593 kernel: SELinux: policy capability always_check_network=0 Jul 12 00:39:42.796603 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 12 00:39:42.796612 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 12 00:39:42.796621 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 12 00:39:42.796631 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 12 00:39:42.796642 systemd[1]: Successfully loaded SELinux policy in 34.043ms. Jul 12 00:39:42.796664 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.064ms. Jul 12 00:39:42.796678 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 12 00:39:42.796689 systemd[1]: Detected virtualization kvm. Jul 12 00:39:42.796700 systemd[1]: Detected architecture arm64. Jul 12 00:39:42.796713 systemd[1]: Detected first boot. Jul 12 00:39:42.796724 systemd[1]: Initializing machine ID from VM UUID. Jul 12 00:39:42.796753 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 12 00:39:42.796765 systemd[1]: Populated /etc with preset unit settings. Jul 12 00:39:42.796778 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 12 00:39:42.796789 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 12 00:39:42.796801 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 12 00:39:42.796812 kernel: kauditd_printk_skb: 78 callbacks suppressed Jul 12 00:39:42.796821 kernel: audit: type=1334 audit(1752280782.653:82): prog-id=12 op=LOAD Jul 12 00:39:42.796831 kernel: audit: type=1334 audit(1752280782.653:83): prog-id=3 op=UNLOAD Jul 12 00:39:42.796840 kernel: audit: type=1334 audit(1752280782.655:84): prog-id=13 op=LOAD Jul 12 00:39:42.796850 kernel: audit: type=1334 audit(1752280782.655:85): prog-id=14 op=LOAD Jul 12 00:39:42.796860 kernel: audit: type=1334 audit(1752280782.655:86): prog-id=4 op=UNLOAD Jul 12 00:39:42.796870 kernel: audit: type=1334 audit(1752280782.655:87): prog-id=5 op=UNLOAD Jul 12 00:39:42.796879 kernel: audit: type=1334 audit(1752280782.656:88): prog-id=15 op=LOAD Jul 12 00:39:42.796888 kernel: audit: type=1334 audit(1752280782.657:89): prog-id=12 op=UNLOAD Jul 12 00:39:42.796899 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 12 00:39:42.796909 kernel: audit: type=1334 audit(1752280782.657:90): prog-id=16 op=LOAD Jul 12 00:39:42.796922 systemd[1]: Stopped iscsiuio.service. Jul 12 00:39:42.796933 kernel: audit: type=1334 audit(1752280782.658:91): prog-id=17 op=LOAD Jul 12 00:39:42.796943 systemd[1]: iscsid.service: Deactivated successfully. Jul 12 00:39:42.796954 systemd[1]: Stopped iscsid.service. Jul 12 00:39:42.796965 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 12 00:39:42.796975 systemd[1]: Stopped initrd-switch-root.service. Jul 12 00:39:42.796986 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 12 00:39:42.796996 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 12 00:39:42.797007 systemd[1]: Created slice system-addon\x2drun.slice. Jul 12 00:39:42.797017 systemd[1]: Created slice system-getty.slice. Jul 12 00:39:42.797028 systemd[1]: Created slice system-modprobe.slice. Jul 12 00:39:42.797040 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 12 00:39:42.797050 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 12 00:39:42.797060 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 12 00:39:42.797070 systemd[1]: Created slice user.slice. Jul 12 00:39:42.797081 systemd[1]: Started systemd-ask-password-console.path. Jul 12 00:39:42.797091 systemd[1]: Started systemd-ask-password-wall.path. Jul 12 00:39:42.797102 systemd[1]: Set up automount boot.automount. Jul 12 00:39:42.797112 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 12 00:39:42.797123 systemd[1]: Stopped target initrd-switch-root.target. Jul 12 00:39:42.797134 systemd[1]: Stopped target initrd-fs.target. Jul 12 00:39:42.797144 systemd[1]: Stopped target initrd-root-fs.target. Jul 12 00:39:42.797155 systemd[1]: Reached target integritysetup.target. Jul 12 00:39:42.797165 systemd[1]: Reached target remote-cryptsetup.target. Jul 12 00:39:42.797175 systemd[1]: Reached target remote-fs.target. Jul 12 00:39:42.797185 systemd[1]: Reached target slices.target. Jul 12 00:39:42.797195 systemd[1]: Reached target swap.target. Jul 12 00:39:42.797207 systemd[1]: Reached target torcx.target. Jul 12 00:39:42.797217 systemd[1]: Reached target veritysetup.target. Jul 12 00:39:42.797227 systemd[1]: Listening on systemd-coredump.socket. Jul 12 00:39:42.797237 systemd[1]: Listening on systemd-initctl.socket. Jul 12 00:39:42.797247 systemd[1]: Listening on systemd-networkd.socket. Jul 12 00:39:42.797258 systemd[1]: Listening on systemd-udevd-control.socket. Jul 12 00:39:42.797270 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 12 00:39:42.797281 systemd[1]: Listening on systemd-userdbd.socket. Jul 12 00:39:42.797291 systemd[1]: Mounting dev-hugepages.mount... Jul 12 00:39:42.797302 systemd[1]: Mounting dev-mqueue.mount... Jul 12 00:39:42.797312 systemd[1]: Mounting media.mount... Jul 12 00:39:42.797322 systemd[1]: Mounting sys-kernel-debug.mount... Jul 12 00:39:42.797332 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 12 00:39:42.797343 systemd[1]: Mounting tmp.mount... Jul 12 00:39:42.797353 systemd[1]: Starting flatcar-tmpfiles.service... Jul 12 00:39:42.797364 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:39:42.797374 systemd[1]: Starting kmod-static-nodes.service... Jul 12 00:39:42.797392 systemd[1]: Starting modprobe@configfs.service... Jul 12 00:39:42.797405 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:39:42.797415 systemd[1]: Starting modprobe@drm.service... Jul 12 00:39:42.797425 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:39:42.797435 systemd[1]: Starting modprobe@fuse.service... Jul 12 00:39:42.797446 systemd[1]: Starting modprobe@loop.service... Jul 12 00:39:42.797456 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 12 00:39:42.797467 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 12 00:39:42.797477 systemd[1]: Stopped systemd-fsck-root.service. Jul 12 00:39:42.797488 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 12 00:39:42.797501 systemd[1]: Stopped systemd-fsck-usr.service. Jul 12 00:39:42.797510 systemd[1]: Stopped systemd-journald.service. Jul 12 00:39:42.797520 kernel: loop: module loaded Jul 12 00:39:42.797530 kernel: fuse: init (API version 7.34) Jul 12 00:39:42.797540 systemd[1]: Starting systemd-journald.service... Jul 12 00:39:42.797550 systemd[1]: Starting systemd-modules-load.service... Jul 12 00:39:42.797561 systemd[1]: Starting systemd-network-generator.service... Jul 12 00:39:42.797570 systemd[1]: Starting systemd-remount-fs.service... Jul 12 00:39:42.797581 systemd[1]: Starting systemd-udev-trigger.service... Jul 12 00:39:42.797593 systemd[1]: verity-setup.service: Deactivated successfully. Jul 12 00:39:42.797603 systemd[1]: Stopped verity-setup.service. Jul 12 00:39:42.797613 systemd[1]: Mounted dev-hugepages.mount. Jul 12 00:39:42.797623 systemd[1]: Mounted dev-mqueue.mount. Jul 12 00:39:42.797633 systemd[1]: Mounted media.mount. Jul 12 00:39:42.797643 systemd[1]: Mounted sys-kernel-debug.mount. Jul 12 00:39:42.797653 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 12 00:39:42.797664 systemd[1]: Mounted tmp.mount. Jul 12 00:39:42.797674 systemd[1]: Finished kmod-static-nodes.service. Jul 12 00:39:42.797684 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 12 00:39:42.797696 systemd[1]: Finished modprobe@configfs.service. Jul 12 00:39:42.797708 systemd-journald[1002]: Journal started Jul 12 00:39:42.797775 systemd-journald[1002]: Runtime Journal (/run/log/journal/8a93b14c8aa54d2e97cecb4df9d9a862) is 6.0M, max 48.7M, 42.6M free. Jul 12 00:39:40.826000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 12 00:39:40.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 12 00:39:40.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 12 00:39:40.905000 audit: BPF prog-id=10 op=LOAD Jul 12 00:39:40.905000 audit: BPF prog-id=10 op=UNLOAD Jul 12 00:39:40.905000 audit: BPF prog-id=11 op=LOAD Jul 12 00:39:40.905000 audit: BPF prog-id=11 op=UNLOAD Jul 12 00:39:40.948000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 12 00:39:40.948000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:40.948000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 12 00:39:40.949000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 12 00:39:40.949000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:40.949000 audit: CWD cwd="/" Jul 12 00:39:40.949000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:39:40.949000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:39:40.949000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 12 00:39:42.653000 audit: BPF prog-id=12 op=LOAD Jul 12 00:39:42.653000 audit: BPF prog-id=3 op=UNLOAD Jul 12 00:39:42.655000 audit: BPF prog-id=13 op=LOAD Jul 12 00:39:42.655000 audit: BPF prog-id=14 op=LOAD Jul 12 00:39:42.655000 audit: BPF prog-id=4 op=UNLOAD Jul 12 00:39:42.655000 audit: BPF prog-id=5 op=UNLOAD Jul 12 00:39:42.656000 audit: BPF prog-id=15 op=LOAD Jul 12 00:39:42.657000 audit: BPF prog-id=12 op=UNLOAD Jul 12 00:39:42.657000 audit: BPF prog-id=16 op=LOAD Jul 12 00:39:42.658000 audit: BPF prog-id=17 op=LOAD Jul 12 00:39:42.658000 audit: BPF prog-id=13 op=UNLOAD Jul 12 00:39:42.658000 audit: BPF prog-id=14 op=UNLOAD Jul 12 00:39:42.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.672000 audit: BPF prog-id=15 op=UNLOAD Jul 12 00:39:42.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.768000 audit: BPF prog-id=18 op=LOAD Jul 12 00:39:42.768000 audit: BPF prog-id=19 op=LOAD Jul 12 00:39:42.768000 audit: BPF prog-id=20 op=LOAD Jul 12 00:39:42.768000 audit: BPF prog-id=16 op=UNLOAD Jul 12 00:39:42.768000 audit: BPF prog-id=17 op=UNLOAD Jul 12 00:39:42.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.795000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 12 00:39:42.795000 audit[1002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc9eb44c0 a2=4000 a3=1 items=0 ppid=1 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:42.795000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 12 00:39:42.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.946819 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 12 00:39:42.652283 systemd[1]: Queued start job for default target multi-user.target. Jul 12 00:39:42.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:40.947054 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 12 00:39:42.652296 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 12 00:39:40.947073 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 12 00:39:42.660309 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 12 00:39:40.947104 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 12 00:39:40.947114 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 12 00:39:40.947142 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 12 00:39:40.947153 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 12 00:39:40.947352 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 12 00:39:40.947397 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 12 00:39:40.947411 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 12 00:39:40.948198 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 12 00:39:40.948246 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 12 00:39:40.948279 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 12 00:39:40.948295 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 12 00:39:40.948318 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 12 00:39:42.800250 systemd[1]: Started systemd-journald.service. Jul 12 00:39:40.948335 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 12 00:39:42.400950 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:39:42.401210 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:39:42.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.401298 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:39:42.401465 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:39:42.401512 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 12 00:39:42.401567 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-07-12T00:39:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 12 00:39:42.801047 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:39:42.801213 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:39:42.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.802212 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 12 00:39:42.802390 systemd[1]: Finished modprobe@drm.service. Jul 12 00:39:42.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.803415 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:39:42.803562 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:39:42.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.804909 systemd[1]: Finished flatcar-tmpfiles.service. Jul 12 00:39:42.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.805895 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 12 00:39:42.806052 systemd[1]: Finished modprobe@fuse.service. Jul 12 00:39:42.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.807135 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:39:42.807288 systemd[1]: Finished modprobe@loop.service. Jul 12 00:39:42.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.808398 systemd[1]: Finished systemd-modules-load.service. Jul 12 00:39:42.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.809521 systemd[1]: Finished systemd-network-generator.service. Jul 12 00:39:42.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.810953 systemd[1]: Finished systemd-remount-fs.service. Jul 12 00:39:42.812189 systemd[1]: Reached target network-pre.target. Jul 12 00:39:42.814221 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 12 00:39:42.816863 systemd[1]: Mounting sys-kernel-config.mount... Jul 12 00:39:42.817574 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 12 00:39:42.819152 systemd[1]: Starting systemd-hwdb-update.service... Jul 12 00:39:42.821124 systemd[1]: Starting systemd-journal-flush.service... Jul 12 00:39:42.822034 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 12 00:39:42.827545 systemd-journald[1002]: Time spent on flushing to /var/log/journal/8a93b14c8aa54d2e97cecb4df9d9a862 is 12.021ms for 975 entries. Jul 12 00:39:42.827545 systemd-journald[1002]: System Journal (/var/log/journal/8a93b14c8aa54d2e97cecb4df9d9a862) is 8.0M, max 195.6M, 187.6M free. Jul 12 00:39:42.860013 systemd-journald[1002]: Received client request to flush runtime journal. Jul 12 00:39:42.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.822970 systemd[1]: Starting systemd-random-seed.service... Jul 12 00:39:42.823803 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 12 00:39:42.824764 systemd[1]: Starting systemd-sysctl.service... Jul 12 00:39:42.826872 systemd[1]: Starting systemd-sysusers.service... Jul 12 00:39:42.829927 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 12 00:39:42.861657 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 12 00:39:42.830915 systemd[1]: Mounted sys-kernel-config.mount. Jul 12 00:39:42.832081 systemd[1]: Finished systemd-udev-trigger.service. Jul 12 00:39:42.834265 systemd[1]: Starting systemd-udev-settle.service... Jul 12 00:39:42.841521 systemd[1]: Finished systemd-random-seed.service. Jul 12 00:39:42.842939 systemd[1]: Reached target first-boot-complete.target. Jul 12 00:39:42.852149 systemd[1]: Finished systemd-sysctl.service. Jul 12 00:39:42.854590 systemd[1]: Finished systemd-sysusers.service. Jul 12 00:39:42.856529 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 12 00:39:42.861654 systemd[1]: Finished systemd-journal-flush.service. Jul 12 00:39:42.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:42.872984 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 12 00:39:42.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.212071 systemd[1]: Finished systemd-hwdb-update.service. Jul 12 00:39:43.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.212000 audit: BPF prog-id=21 op=LOAD Jul 12 00:39:43.212000 audit: BPF prog-id=22 op=LOAD Jul 12 00:39:43.212000 audit: BPF prog-id=7 op=UNLOAD Jul 12 00:39:43.212000 audit: BPF prog-id=8 op=UNLOAD Jul 12 00:39:43.214330 systemd[1]: Starting systemd-udevd.service... Jul 12 00:39:43.234911 systemd-udevd[1037]: Using default interface naming scheme 'v252'. Jul 12 00:39:43.246868 systemd[1]: Started systemd-udevd.service. Jul 12 00:39:43.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.248000 audit: BPF prog-id=23 op=LOAD Jul 12 00:39:43.251803 systemd[1]: Starting systemd-networkd.service... Jul 12 00:39:43.260000 audit: BPF prog-id=24 op=LOAD Jul 12 00:39:43.260000 audit: BPF prog-id=25 op=LOAD Jul 12 00:39:43.260000 audit: BPF prog-id=26 op=LOAD Jul 12 00:39:43.261912 systemd[1]: Starting systemd-userdbd.service... Jul 12 00:39:43.272455 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 12 00:39:43.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.301126 systemd[1]: Started systemd-userdbd.service. Jul 12 00:39:43.336817 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 12 00:39:43.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.345159 systemd[1]: Finished systemd-udev-settle.service. Jul 12 00:39:43.347301 systemd[1]: Starting lvm2-activation-early.service... Jul 12 00:39:43.366221 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 12 00:39:43.371501 systemd-networkd[1052]: lo: Link UP Jul 12 00:39:43.371512 systemd-networkd[1052]: lo: Gained carrier Jul 12 00:39:43.371978 systemd-networkd[1052]: Enumeration completed Jul 12 00:39:43.372093 systemd[1]: Started systemd-networkd.service. Jul 12 00:39:43.372094 systemd-networkd[1052]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 12 00:39:43.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.373537 systemd-networkd[1052]: eth0: Link UP Jul 12 00:39:43.373547 systemd-networkd[1052]: eth0: Gained carrier Jul 12 00:39:43.396615 systemd[1]: Finished lvm2-activation-early.service. Jul 12 00:39:43.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.397611 systemd[1]: Reached target cryptsetup.target. Jul 12 00:39:43.399520 systemd[1]: Starting lvm2-activation.service... Jul 12 00:39:43.399860 systemd-networkd[1052]: eth0: DHCPv4 address 10.0.0.137/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 12 00:39:43.403319 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 12 00:39:43.430745 systemd[1]: Finished lvm2-activation.service. Jul 12 00:39:43.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.431675 systemd[1]: Reached target local-fs-pre.target. Jul 12 00:39:43.432511 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 12 00:39:43.432545 systemd[1]: Reached target local-fs.target. Jul 12 00:39:43.433292 systemd[1]: Reached target machines.target. Jul 12 00:39:43.435250 systemd[1]: Starting ldconfig.service... Jul 12 00:39:43.436265 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:39:43.436316 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:39:43.437368 systemd[1]: Starting systemd-boot-update.service... Jul 12 00:39:43.439134 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 12 00:39:43.441438 systemd[1]: Starting systemd-machine-id-commit.service... Jul 12 00:39:43.444320 systemd[1]: Starting systemd-sysext.service... Jul 12 00:39:43.445941 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) Jul 12 00:39:43.447130 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 12 00:39:43.451596 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 12 00:39:43.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.456133 systemd[1]: Unmounting usr-share-oem.mount... Jul 12 00:39:43.462452 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 12 00:39:43.462651 systemd[1]: Unmounted usr-share-oem.mount. Jul 12 00:39:43.478754 kernel: loop0: detected capacity change from 0 to 211168 Jul 12 00:39:43.482758 systemd-fsck[1082]: fsck.fat 4.2 (2021-01-31) Jul 12 00:39:43.482758 systemd-fsck[1082]: /dev/vda1: 236 files, 117310/258078 clusters Jul 12 00:39:43.484776 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 12 00:39:43.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.487189 systemd[1]: Mounting boot.mount... Jul 12 00:39:43.585785 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 12 00:39:43.590512 systemd[1]: Mounted boot.mount. Jul 12 00:39:43.604751 kernel: loop1: detected capacity change from 0 to 211168 Jul 12 00:39:43.610326 systemd[1]: Finished systemd-boot-update.service. Jul 12 00:39:43.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.611784 systemd[1]: Finished systemd-machine-id-commit.service. Jul 12 00:39:43.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.614607 (sd-sysext)[1089]: Using extensions 'kubernetes'. Jul 12 00:39:43.615226 (sd-sysext)[1089]: Merged extensions into '/usr'. Jul 12 00:39:43.630887 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:39:43.632194 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:39:43.634346 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:39:43.636158 systemd[1]: Starting modprobe@loop.service... Jul 12 00:39:43.637027 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:39:43.637157 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:39:43.637928 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:39:43.638073 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:39:43.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.639447 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:39:43.639567 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:39:43.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.640946 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:39:43.641064 systemd[1]: Finished modprobe@loop.service. Jul 12 00:39:43.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.642314 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 12 00:39:43.642426 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 12 00:39:43.728554 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 12 00:39:43.731775 systemd[1]: Finished ldconfig.service. Jul 12 00:39:43.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.785464 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 12 00:39:43.787300 systemd[1]: Mounting usr-share-oem.mount... Jul 12 00:39:43.792253 systemd[1]: Mounted usr-share-oem.mount. Jul 12 00:39:43.793985 systemd[1]: Finished systemd-sysext.service. Jul 12 00:39:43.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.795869 systemd[1]: Starting ensure-sysext.service... Jul 12 00:39:43.797495 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 12 00:39:43.803033 systemd[1]: Reloading. Jul 12 00:39:43.806586 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 12 00:39:43.807345 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 12 00:39:43.808636 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 12 00:39:43.846036 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2025-07-12T00:39:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 12 00:39:43.846061 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2025-07-12T00:39:43Z" level=info msg="torcx already run" Jul 12 00:39:43.903661 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 12 00:39:43.903683 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 12 00:39:43.918879 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 12 00:39:43.959000 audit: BPF prog-id=27 op=LOAD Jul 12 00:39:43.959000 audit: BPF prog-id=23 op=UNLOAD Jul 12 00:39:43.960000 audit: BPF prog-id=28 op=LOAD Jul 12 00:39:43.960000 audit: BPF prog-id=29 op=LOAD Jul 12 00:39:43.960000 audit: BPF prog-id=21 op=UNLOAD Jul 12 00:39:43.960000 audit: BPF prog-id=22 op=UNLOAD Jul 12 00:39:43.961000 audit: BPF prog-id=30 op=LOAD Jul 12 00:39:43.961000 audit: BPF prog-id=24 op=UNLOAD Jul 12 00:39:43.961000 audit: BPF prog-id=31 op=LOAD Jul 12 00:39:43.961000 audit: BPF prog-id=32 op=LOAD Jul 12 00:39:43.961000 audit: BPF prog-id=25 op=UNLOAD Jul 12 00:39:43.961000 audit: BPF prog-id=26 op=UNLOAD Jul 12 00:39:43.962000 audit: BPF prog-id=33 op=LOAD Jul 12 00:39:43.962000 audit: BPF prog-id=18 op=UNLOAD Jul 12 00:39:43.962000 audit: BPF prog-id=34 op=LOAD Jul 12 00:39:43.962000 audit: BPF prog-id=35 op=LOAD Jul 12 00:39:43.962000 audit: BPF prog-id=19 op=UNLOAD Jul 12 00:39:43.962000 audit: BPF prog-id=20 op=UNLOAD Jul 12 00:39:43.965138 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 12 00:39:43.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.969453 systemd[1]: Starting audit-rules.service... Jul 12 00:39:43.971220 systemd[1]: Starting clean-ca-certificates.service... Jul 12 00:39:43.973114 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 12 00:39:43.975000 audit: BPF prog-id=36 op=LOAD Jul 12 00:39:43.977182 systemd[1]: Starting systemd-resolved.service... Jul 12 00:39:43.981000 audit: BPF prog-id=37 op=LOAD Jul 12 00:39:43.983069 systemd[1]: Starting systemd-timesyncd.service... Jul 12 00:39:43.985327 systemd[1]: Starting systemd-update-utmp.service... Jul 12 00:39:43.989510 systemd[1]: Finished clean-ca-certificates.service. Jul 12 00:39:43.990000 audit[1167]: SYSTEM_BOOT pid=1167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:43.992447 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:39:43.993674 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:39:43.995529 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:39:43.997443 systemd[1]: Starting modprobe@loop.service... Jul 12 00:39:43.998199 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:39:43.998357 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:39:43.998520 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 12 00:39:43.999631 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:39:43.999796 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:39:44.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.001087 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:39:44.001194 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:39:44.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.002620 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:39:44.002713 systemd[1]: Finished modprobe@loop.service. Jul 12 00:39:44.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.005149 systemd[1]: Finished systemd-update-utmp.service. Jul 12 00:39:44.007134 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 12 00:39:44.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.008510 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:39:44.009655 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:39:44.011622 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:39:44.013464 systemd[1]: Starting modprobe@loop.service... Jul 12 00:39:44.014244 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:39:44.014352 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:39:44.015549 systemd[1]: Starting systemd-update-done.service... Jul 12 00:39:44.016439 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 12 00:39:44.017868 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:39:44.017991 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:39:44.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.021183 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:39:44.021297 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:39:44.022513 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:39:44.022622 systemd[1]: Finished modprobe@loop.service. Jul 12 00:39:44.025657 systemd[1]: Finished systemd-update-done.service. Jul 12 00:39:44.027141 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:39:44.028390 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:39:44.030423 systemd[1]: Starting modprobe@drm.service... Jul 12 00:39:44.032326 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:39:44.034428 systemd[1]: Starting modprobe@loop.service... Jul 12 00:39:44.035229 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:39:44.035362 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:39:44.036569 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 12 00:39:44.037601 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 12 00:39:44.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.038904 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:39:44.039037 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:39:44.040217 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 12 00:39:44.040321 systemd[1]: Finished modprobe@drm.service. Jul 12 00:39:44.041460 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:39:44.041565 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:39:44.042771 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:39:44.042878 systemd[1]: Finished modprobe@loop.service. Jul 12 00:39:44.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.044150 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 12 00:39:44.044220 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 12 00:39:44.045369 systemd[1]: Finished ensure-sysext.service. Jul 12 00:39:44.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.047794 systemd[1]: Started systemd-timesyncd.service. Jul 12 00:39:44.048936 systemd-timesyncd[1161]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 12 00:39:44.048984 systemd-timesyncd[1161]: Initial clock synchronization to Sat 2025-07-12 00:39:44.302196 UTC. Jul 12 00:39:44.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:44.049537 systemd[1]: Reached target time-set.target. Jul 12 00:39:44.053000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 12 00:39:44.053000 audit[1189]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe6087470 a2=420 a3=0 items=0 ppid=1156 pid=1189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:44.053000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 12 00:39:44.054483 augenrules[1189]: No rules Jul 12 00:39:44.054849 systemd-resolved[1160]: Positive Trust Anchors: Jul 12 00:39:44.054859 systemd-resolved[1160]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 12 00:39:44.054886 systemd-resolved[1160]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 12 00:39:44.056440 systemd[1]: Finished audit-rules.service. Jul 12 00:39:44.072281 systemd-resolved[1160]: Defaulting to hostname 'linux'. Jul 12 00:39:44.073750 systemd[1]: Started systemd-resolved.service. Jul 12 00:39:44.074582 systemd[1]: Reached target network.target. Jul 12 00:39:44.075358 systemd[1]: Reached target nss-lookup.target. Jul 12 00:39:44.076169 systemd[1]: Reached target sysinit.target. Jul 12 00:39:44.076979 systemd[1]: Started motdgen.path. Jul 12 00:39:44.077653 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 12 00:39:44.078871 systemd[1]: Started logrotate.timer. Jul 12 00:39:44.079650 systemd[1]: Started mdadm.timer. Jul 12 00:39:44.080339 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 12 00:39:44.081161 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 12 00:39:44.081196 systemd[1]: Reached target paths.target. Jul 12 00:39:44.081890 systemd[1]: Reached target timers.target. Jul 12 00:39:44.082878 systemd[1]: Listening on dbus.socket. Jul 12 00:39:44.084626 systemd[1]: Starting docker.socket... Jul 12 00:39:44.087718 systemd[1]: Listening on sshd.socket. Jul 12 00:39:44.088537 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:39:44.089000 systemd[1]: Listening on docker.socket. Jul 12 00:39:44.089802 systemd[1]: Reached target sockets.target. Jul 12 00:39:44.090535 systemd[1]: Reached target basic.target. Jul 12 00:39:44.091283 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 12 00:39:44.091317 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 12 00:39:44.092281 systemd[1]: Starting containerd.service... Jul 12 00:39:44.093989 systemd[1]: Starting dbus.service... Jul 12 00:39:44.096001 systemd[1]: Starting enable-oem-cloudinit.service... Jul 12 00:39:44.098180 systemd[1]: Starting extend-filesystems.service... Jul 12 00:39:44.099140 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 12 00:39:44.100396 systemd[1]: Starting motdgen.service... Jul 12 00:39:44.103312 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 12 00:39:44.105461 systemd[1]: Starting sshd-keygen.service... Jul 12 00:39:44.108876 jq[1198]: false Jul 12 00:39:44.108820 systemd[1]: Starting systemd-logind.service... Jul 12 00:39:44.109652 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:39:44.109775 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 12 00:39:44.110232 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 12 00:39:44.110976 systemd[1]: Starting update-engine.service... Jul 12 00:39:44.112999 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 12 00:39:44.117150 jq[1212]: true Jul 12 00:39:44.118243 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 12 00:39:44.118435 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 12 00:39:44.118855 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 12 00:39:44.119039 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 12 00:39:44.127334 jq[1219]: true Jul 12 00:39:44.136030 extend-filesystems[1199]: Found loop1 Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda1 Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda2 Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda3 Jul 12 00:39:44.136030 extend-filesystems[1199]: Found usr Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda4 Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda6 Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda7 Jul 12 00:39:44.136030 extend-filesystems[1199]: Found vda9 Jul 12 00:39:44.136030 extend-filesystems[1199]: Checking size of /dev/vda9 Jul 12 00:39:44.147909 systemd[1]: motdgen.service: Deactivated successfully. Jul 12 00:39:44.148119 systemd[1]: Finished motdgen.service. Jul 12 00:39:44.158971 dbus-daemon[1197]: [system] SELinux support is enabled Jul 12 00:39:44.159144 systemd[1]: Started dbus.service. Jul 12 00:39:44.161848 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 12 00:39:44.161877 systemd[1]: Reached target system-config.target. Jul 12 00:39:44.162823 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 12 00:39:44.162854 systemd[1]: Reached target user-config.target. Jul 12 00:39:44.168478 extend-filesystems[1199]: Resized partition /dev/vda9 Jul 12 00:39:44.170041 extend-filesystems[1244]: resize2fs 1.46.5 (30-Dec-2021) Jul 12 00:39:44.179562 bash[1241]: Updated "/home/core/.ssh/authorized_keys" Jul 12 00:39:44.180447 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 12 00:39:44.184752 systemd-logind[1206]: Watching system buttons on /dev/input/event0 (Power Button) Jul 12 00:39:44.185782 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 12 00:39:44.186532 systemd-logind[1206]: New seat seat0. Jul 12 00:39:44.191681 systemd[1]: Started systemd-logind.service. Jul 12 00:39:44.199626 update_engine[1209]: I0712 00:39:44.199350 1209 main.cc:92] Flatcar Update Engine starting Jul 12 00:39:44.202492 systemd[1]: Started update-engine.service. Jul 12 00:39:44.202606 update_engine[1209]: I0712 00:39:44.202579 1209 update_check_scheduler.cc:74] Next update check in 10m34s Jul 12 00:39:44.207171 systemd[1]: Started locksmithd.service. Jul 12 00:39:44.218196 env[1218]: time="2025-07-12T00:39:44.218152240Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 12 00:39:44.229752 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 12 00:39:44.243824 env[1218]: time="2025-07-12T00:39:44.236016360Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 12 00:39:44.243824 env[1218]: time="2025-07-12T00:39:44.243817600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:39:44.244167 extend-filesystems[1244]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 12 00:39:44.244167 extend-filesystems[1244]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 12 00:39:44.244167 extend-filesystems[1244]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 12 00:39:44.249180 extend-filesystems[1199]: Resized filesystem in /dev/vda9 Jul 12 00:39:44.246488 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.244961000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.244990560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245186160Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245202520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245215080Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245225360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245294200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245505840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245615400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 12 00:39:44.250254 env[1218]: time="2025-07-12T00:39:44.245629120Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 12 00:39:44.246673 systemd[1]: Finished extend-filesystems.service. Jul 12 00:39:44.250550 env[1218]: time="2025-07-12T00:39:44.245677480Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 12 00:39:44.250550 env[1218]: time="2025-07-12T00:39:44.245689960Z" level=info msg="metadata content store policy set" policy=shared Jul 12 00:39:44.251608 env[1218]: time="2025-07-12T00:39:44.251465880Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 12 00:39:44.251608 env[1218]: time="2025-07-12T00:39:44.251498400Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 12 00:39:44.251608 env[1218]: time="2025-07-12T00:39:44.251518360Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 12 00:39:44.251608 env[1218]: time="2025-07-12T00:39:44.251548480Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.251608 env[1218]: time="2025-07-12T00:39:44.251563600Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.251608 env[1218]: time="2025-07-12T00:39:44.251580680Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.251608 env[1218]: time="2025-07-12T00:39:44.251593360Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.251965 env[1218]: time="2025-07-12T00:39:44.251951040Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.252098 env[1218]: time="2025-07-12T00:39:44.251972040Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.252098 env[1218]: time="2025-07-12T00:39:44.251985680Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.252098 env[1218]: time="2025-07-12T00:39:44.252000440Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.252098 env[1218]: time="2025-07-12T00:39:44.252012840Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 12 00:39:44.252182 env[1218]: time="2025-07-12T00:39:44.252114600Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 12 00:39:44.252203 env[1218]: time="2025-07-12T00:39:44.252186680Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 12 00:39:44.252494 env[1218]: time="2025-07-12T00:39:44.252422440Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 12 00:39:44.252494 env[1218]: time="2025-07-12T00:39:44.252450080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252494 env[1218]: time="2025-07-12T00:39:44.252463480Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 12 00:39:44.252621 env[1218]: time="2025-07-12T00:39:44.252609040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252646 env[1218]: time="2025-07-12T00:39:44.252625480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252646 env[1218]: time="2025-07-12T00:39:44.252638840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252687 env[1218]: time="2025-07-12T00:39:44.252650960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252687 env[1218]: time="2025-07-12T00:39:44.252663440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252687 env[1218]: time="2025-07-12T00:39:44.252675440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252753 env[1218]: time="2025-07-12T00:39:44.252686520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252753 env[1218]: time="2025-07-12T00:39:44.252698080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252753 env[1218]: time="2025-07-12T00:39:44.252716880Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 12 00:39:44.252859 env[1218]: time="2025-07-12T00:39:44.252843120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252884 env[1218]: time="2025-07-12T00:39:44.252864160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252884 env[1218]: time="2025-07-12T00:39:44.252877080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.252922 env[1218]: time="2025-07-12T00:39:44.252899160Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 12 00:39:44.252922 env[1218]: time="2025-07-12T00:39:44.252913400Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 12 00:39:44.252962 env[1218]: time="2025-07-12T00:39:44.252924920Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 12 00:39:44.252962 env[1218]: time="2025-07-12T00:39:44.252943120Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 12 00:39:44.252998 env[1218]: time="2025-07-12T00:39:44.252977840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 12 00:39:44.253213 env[1218]: time="2025-07-12T00:39:44.253169320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 12 00:39:44.254851 env[1218]: time="2025-07-12T00:39:44.253226480Z" level=info msg="Connect containerd service" Jul 12 00:39:44.254851 env[1218]: time="2025-07-12T00:39:44.253258320Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 12 00:39:44.254851 env[1218]: time="2025-07-12T00:39:44.253915480Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 12 00:39:44.254851 env[1218]: time="2025-07-12T00:39:44.254245760Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 12 00:39:44.254851 env[1218]: time="2025-07-12T00:39:44.254280000Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 12 00:39:44.254851 env[1218]: time="2025-07-12T00:39:44.254316480Z" level=info msg="containerd successfully booted in 0.036921s" Jul 12 00:39:44.254706 systemd[1]: Started containerd.service. Jul 12 00:39:44.255026 env[1218]: time="2025-07-12T00:39:44.254931800Z" level=info msg="Start subscribing containerd event" Jul 12 00:39:44.255790 env[1218]: time="2025-07-12T00:39:44.255746640Z" level=info msg="Start recovering state" Jul 12 00:39:44.255878 env[1218]: time="2025-07-12T00:39:44.255834920Z" level=info msg="Start event monitor" Jul 12 00:39:44.255878 env[1218]: time="2025-07-12T00:39:44.255854840Z" level=info msg="Start snapshots syncer" Jul 12 00:39:44.255878 env[1218]: time="2025-07-12T00:39:44.255870720Z" level=info msg="Start cni network conf syncer for default" Jul 12 00:39:44.256628 env[1218]: time="2025-07-12T00:39:44.255879560Z" level=info msg="Start streaming server" Jul 12 00:39:44.273832 locksmithd[1246]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 12 00:39:45.171360 systemd-networkd[1052]: eth0: Gained IPv6LL Jul 12 00:39:45.174002 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 12 00:39:45.175222 systemd[1]: Reached target network-online.target. Jul 12 00:39:45.177627 systemd[1]: Starting kubelet.service... Jul 12 00:39:45.804294 systemd[1]: Started kubelet.service. Jul 12 00:39:45.957186 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 12 00:39:45.974474 systemd[1]: Finished sshd-keygen.service. Jul 12 00:39:45.976927 systemd[1]: Starting issuegen.service... Jul 12 00:39:45.981530 systemd[1]: issuegen.service: Deactivated successfully. Jul 12 00:39:45.981696 systemd[1]: Finished issuegen.service. Jul 12 00:39:45.983953 systemd[1]: Starting systemd-user-sessions.service... Jul 12 00:39:45.990245 systemd[1]: Finished systemd-user-sessions.service. Jul 12 00:39:45.992634 systemd[1]: Started getty@tty1.service. Jul 12 00:39:45.995102 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 12 00:39:45.996236 systemd[1]: Reached target getty.target. Jul 12 00:39:45.997239 systemd[1]: Reached target multi-user.target. Jul 12 00:39:45.999384 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 12 00:39:46.006245 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 12 00:39:46.006401 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 12 00:39:46.007584 systemd[1]: Startup finished in 584ms (kernel) + 4.218s (initrd) + 5.218s (userspace) = 10.021s. Jul 12 00:39:46.264636 kubelet[1264]: E0712 00:39:46.264584 1264 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 12 00:39:46.266746 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 12 00:39:46.266884 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 12 00:39:49.641258 systemd[1]: Created slice system-sshd.slice. Jul 12 00:39:49.642380 systemd[1]: Started sshd@0-10.0.0.137:22-10.0.0.1:47076.service. Jul 12 00:39:49.691431 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 47076 ssh2: RSA SHA256:lOTsI5S5omJPCdinbmTXhzZlC32lNQZJGtwxzlZSG1o Jul 12 00:39:49.693257 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:49.708549 systemd[1]: Created slice user-500.slice. Jul 12 00:39:49.709842 systemd[1]: Starting user-runtime-dir@500.service... Jul 12 00:39:49.714841 systemd-logind[1206]: New session 1 of user core. Jul 12 00:39:49.719789 systemd[1]: Finished user-runtime-dir@500.service. Jul 12 00:39:49.721388 systemd[1]: Starting user@500.service... Jul 12 00:39:49.724535 (systemd)[1289]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:49.786259 systemd[1289]: Queued start job for default target default.target. Jul 12 00:39:49.786727 systemd[1289]: Reached target paths.target. Jul 12 00:39:49.786781 systemd[1289]: Reached target sockets.target. Jul 12 00:39:49.786794 systemd[1289]: Reached target timers.target. Jul 12 00:39:49.786803 systemd[1289]: Reached target basic.target. Jul 12 00:39:49.786852 systemd[1289]: Reached target default.target. Jul 12 00:39:49.786877 systemd[1289]: Startup finished in 55ms. Jul 12 00:39:49.787142 systemd[1]: Started user@500.service. Jul 12 00:39:49.788956 systemd[1]: Started session-1.scope. Jul 12 00:39:49.844347 systemd[1]: Started sshd@1-10.0.0.137:22-10.0.0.1:47088.service. Jul 12 00:39:49.885127 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 47088 ssh2: RSA SHA256:lOTsI5S5omJPCdinbmTXhzZlC32lNQZJGtwxzlZSG1o Jul 12 00:39:49.886322 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:49.891029 systemd[1]: Started session-2.scope. Jul 12 00:39:49.891317 systemd-logind[1206]: New session 2 of user core. Jul 12 00:39:49.947858 sshd[1298]: pam_unix(sshd:session): session closed for user core Jul 12 00:39:49.950591 systemd[1]: sshd@1-10.0.0.137:22-10.0.0.1:47088.service: Deactivated successfully. Jul 12 00:39:49.951220 systemd[1]: session-2.scope: Deactivated successfully. Jul 12 00:39:49.951738 systemd-logind[1206]: Session 2 logged out. Waiting for processes to exit. Jul 12 00:39:49.953123 systemd[1]: Started sshd@2-10.0.0.137:22-10.0.0.1:47102.service. Jul 12 00:39:49.953951 systemd-logind[1206]: Removed session 2. Jul 12 00:39:49.994334 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 47102 ssh2: RSA SHA256:lOTsI5S5omJPCdinbmTXhzZlC32lNQZJGtwxzlZSG1o Jul 12 00:39:49.995638 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:49.999822 systemd-logind[1206]: New session 3 of user core. Jul 12 00:39:50.000241 systemd[1]: Started session-3.scope. Jul 12 00:39:50.050204 sshd[1304]: pam_unix(sshd:session): session closed for user core Jul 12 00:39:50.052987 systemd[1]: sshd@2-10.0.0.137:22-10.0.0.1:47102.service: Deactivated successfully. Jul 12 00:39:50.053576 systemd[1]: session-3.scope: Deactivated successfully. Jul 12 00:39:50.054534 systemd-logind[1206]: Session 3 logged out. Waiting for processes to exit. Jul 12 00:39:50.058111 systemd[1]: Started sshd@3-10.0.0.137:22-10.0.0.1:47110.service. Jul 12 00:39:50.058794 systemd-logind[1206]: Removed session 3. Jul 12 00:39:50.099997 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 47110 ssh2: RSA SHA256:lOTsI5S5omJPCdinbmTXhzZlC32lNQZJGtwxzlZSG1o Jul 12 00:39:50.101193 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:50.104965 systemd-logind[1206]: New session 4 of user core. Jul 12 00:39:50.105800 systemd[1]: Started session-4.scope. Jul 12 00:39:50.160000 sshd[1310]: pam_unix(sshd:session): session closed for user core Jul 12 00:39:50.163651 systemd[1]: Started sshd@4-10.0.0.137:22-10.0.0.1:47114.service. Jul 12 00:39:50.164173 systemd[1]: sshd@3-10.0.0.137:22-10.0.0.1:47110.service: Deactivated successfully. Jul 12 00:39:50.164784 systemd[1]: session-4.scope: Deactivated successfully. Jul 12 00:39:50.165242 systemd-logind[1206]: Session 4 logged out. Waiting for processes to exit. Jul 12 00:39:50.165944 systemd-logind[1206]: Removed session 4. Jul 12 00:39:50.205166 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 47114 ssh2: RSA SHA256:lOTsI5S5omJPCdinbmTXhzZlC32lNQZJGtwxzlZSG1o Jul 12 00:39:50.206288 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:50.209748 systemd-logind[1206]: New session 5 of user core. Jul 12 00:39:50.210560 systemd[1]: Started session-5.scope. Jul 12 00:39:50.266942 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 12 00:39:50.267182 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:39:50.275894 dbus-daemon[1197]: avc: received setenforce notice (enforcing=1) Jul 12 00:39:50.276788 sudo[1320]: pam_unix(sudo:session): session closed for user root Jul 12 00:39:50.278689 sshd[1315]: pam_unix(sshd:session): session closed for user core Jul 12 00:39:50.281492 systemd[1]: sshd@4-10.0.0.137:22-10.0.0.1:47114.service: Deactivated successfully. Jul 12 00:39:50.282078 systemd[1]: session-5.scope: Deactivated successfully. Jul 12 00:39:50.282623 systemd-logind[1206]: Session 5 logged out. Waiting for processes to exit. Jul 12 00:39:50.283678 systemd[1]: Started sshd@5-10.0.0.137:22-10.0.0.1:47126.service. Jul 12 00:39:50.284390 systemd-logind[1206]: Removed session 5. Jul 12 00:39:50.326317 sshd[1324]: Accepted publickey for core from 10.0.0.1 port 47126 ssh2: RSA SHA256:lOTsI5S5omJPCdinbmTXhzZlC32lNQZJGtwxzlZSG1o Jul 12 00:39:50.327620 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:50.331439 systemd-logind[1206]: New session 6 of user core. Jul 12 00:39:50.331842 systemd[1]: Started session-6.scope. Jul 12 00:39:50.385224 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 12 00:39:50.385675 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:39:50.388477 sudo[1328]: pam_unix(sudo:session): session closed for user root Jul 12 00:39:50.392658 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 12 00:39:50.392886 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:39:50.400909 systemd[1]: Stopping audit-rules.service... Jul 12 00:39:50.400000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 12 00:39:50.404257 kernel: kauditd_printk_skb: 123 callbacks suppressed Jul 12 00:39:50.404293 kernel: audit: type=1305 audit(1752280790.400:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 12 00:39:50.404312 kernel: audit: type=1300 audit(1752280790.400:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdc3cbd10 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:50.400000 audit[1331]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdc3cbd10 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:50.407072 auditctl[1331]: No rules Jul 12 00:39:50.407274 systemd[1]: audit-rules.service: Deactivated successfully. Jul 12 00:39:50.407425 systemd[1]: Stopped audit-rules.service. Jul 12 00:39:50.400000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 12 00:39:50.409061 kernel: audit: type=1327 audit(1752280790.400:211): proctitle=2F7362696E2F617564697463746C002D44 Jul 12 00:39:50.409124 kernel: audit: type=1131 audit(1752280790.405:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.408802 systemd[1]: Starting audit-rules.service... Jul 12 00:39:50.424539 augenrules[1348]: No rules Jul 12 00:39:50.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.425096 systemd[1]: Finished audit-rules.service. Jul 12 00:39:50.426268 sudo[1327]: pam_unix(sudo:session): session closed for user root Jul 12 00:39:50.428583 sshd[1324]: pam_unix(sshd:session): session closed for user core Jul 12 00:39:50.425000 audit[1327]: USER_END pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.431019 systemd[1]: Started sshd@6-10.0.0.137:22-10.0.0.1:47134.service. Jul 12 00:39:50.431595 kernel: audit: type=1130 audit(1752280790.424:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.431633 kernel: audit: type=1106 audit(1752280790.425:214): pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.425000 audit[1327]: CRED_DISP pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.434257 kernel: audit: type=1104 audit(1752280790.425:215): pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.137:22-10.0.0.1:47134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.436989 kernel: audit: type=1130 audit(1752280790.430:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.137:22-10.0.0.1:47134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.436000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.441329 kernel: audit: type=1106 audit(1752280790.436:217): pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.441584 systemd[1]: sshd@5-10.0.0.137:22-10.0.0.1:47126.service: Deactivated successfully. Jul 12 00:39:50.442237 systemd[1]: session-6.scope: Deactivated successfully. Jul 12 00:39:50.436000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.445381 kernel: audit: type=1104 audit(1752280790.436:218): pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.137:22-10.0.0.1:47126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.445576 systemd-logind[1206]: Session 6 logged out. Waiting for processes to exit. Jul 12 00:39:50.446602 systemd-logind[1206]: Removed session 6. Jul 12 00:39:50.470000 audit[1353]: USER_ACCT pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.472777 sshd[1353]: Accepted publickey for core from 10.0.0.1 port 47134 ssh2: RSA SHA256:lOTsI5S5omJPCdinbmTXhzZlC32lNQZJGtwxzlZSG1o Jul 12 00:39:50.471000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.471000 audit[1353]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc1a5080 a2=3 a3=1 items=0 ppid=1 pid=1353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:50.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:39:50.473981 sshd[1353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:39:50.477427 systemd-logind[1206]: New session 7 of user core. Jul 12 00:39:50.477810 systemd[1]: Started session-7.scope. Jul 12 00:39:50.480000 audit[1353]: USER_START pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.482000 audit[1356]: CRED_ACQ pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:50.530676 sudo[1357]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 12 00:39:50.530929 sudo[1357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:39:50.528000 audit[1357]: USER_ACCT pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.529000 audit[1357]: CRED_REFR pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.530000 audit[1357]: USER_START pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.542524 systemd[1]: Starting coreos-metadata.service... Jul 12 00:39:50.548884 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 12 00:39:50.549054 systemd[1]: Finished coreos-metadata.service. Jul 12 00:39:50.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:50.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:51.041914 systemd[1]: Stopped kubelet.service. Jul 12 00:39:51.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:51.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:51.043991 systemd[1]: Starting kubelet.service... Jul 12 00:39:51.068413 systemd[1]: Reloading. Jul 12 00:39:51.131189 /usr/lib/systemd/system-generators/torcx-generator[1419]: time="2025-07-12T00:39:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 12 00:39:51.131223 /usr/lib/systemd/system-generators/torcx-generator[1419]: time="2025-07-12T00:39:51Z" level=info msg="torcx already run" Jul 12 00:39:51.301499 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 12 00:39:51.301524 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 12 00:39:51.318256 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.367000 audit: BPF prog-id=43 op=LOAD Jul 12 00:39:51.367000 audit: BPF prog-id=41 op=UNLOAD Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit: BPF prog-id=44 op=LOAD Jul 12 00:39:51.368000 audit: BPF prog-id=38 op=UNLOAD Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit: BPF prog-id=45 op=LOAD Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.368000 audit: BPF prog-id=46 op=LOAD Jul 12 00:39:51.368000 audit: BPF prog-id=39 op=UNLOAD Jul 12 00:39:51.368000 audit: BPF prog-id=40 op=UNLOAD Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.369000 audit: BPF prog-id=47 op=LOAD Jul 12 00:39:51.369000 audit: BPF prog-id=27 op=UNLOAD Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit: BPF prog-id=48 op=LOAD Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit: BPF prog-id=49 op=LOAD Jul 12 00:39:51.371000 audit: BPF prog-id=28 op=UNLOAD Jul 12 00:39:51.371000 audit: BPF prog-id=29 op=UNLOAD Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit: BPF prog-id=50 op=LOAD Jul 12 00:39:51.371000 audit: BPF prog-id=30 op=UNLOAD Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit: BPF prog-id=51 op=LOAD Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.371000 audit: BPF prog-id=52 op=LOAD Jul 12 00:39:51.371000 audit: BPF prog-id=31 op=UNLOAD Jul 12 00:39:51.371000 audit: BPF prog-id=32 op=UNLOAD Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit: BPF prog-id=53 op=LOAD Jul 12 00:39:51.373000 audit: BPF prog-id=36 op=UNLOAD Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.373000 audit: BPF prog-id=54 op=LOAD Jul 12 00:39:51.373000 audit: BPF prog-id=37 op=UNLOAD Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.374000 audit: BPF prog-id=55 op=LOAD Jul 12 00:39:51.374000 audit: BPF prog-id=33 op=UNLOAD Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit: BPF prog-id=56 op=LOAD Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:51.375000 audit: BPF prog-id=57 op=LOAD Jul 12 00:39:51.375000 audit: BPF prog-id=34 op=UNLOAD Jul 12 00:39:51.375000 audit: BPF prog-id=35 op=UNLOAD Jul 12 00:39:51.385192 systemd[1]: Started kubelet.service. Jul 12 00:39:51.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:51.386719 systemd[1]: Stopping kubelet.service... Jul 12 00:39:51.386985 systemd[1]: kubelet.service: Deactivated successfully. Jul 12 00:39:51.387187 systemd[1]: Stopped kubelet.service. Jul 12 00:39:51.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:51.388640 systemd[1]: Starting kubelet.service... Jul 12 00:39:51.485988 systemd[1]: Started kubelet.service. Jul 12 00:39:51.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:51.521465 kubelet[1463]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 12 00:39:51.521465 kubelet[1463]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 12 00:39:51.521465 kubelet[1463]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 12 00:39:51.521847 kubelet[1463]: I0712 00:39:51.521496 1463 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 12 00:39:52.675892 kubelet[1463]: I0712 00:39:52.675843 1463 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Jul 12 00:39:52.675892 kubelet[1463]: I0712 00:39:52.675878 1463 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 12 00:39:52.676275 kubelet[1463]: I0712 00:39:52.676097 1463 server.go:956] "Client rotation is on, will bootstrap in background" Jul 12 00:39:52.728623 kubelet[1463]: I0712 00:39:52.728418 1463 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 12 00:39:52.742694 kubelet[1463]: E0712 00:39:52.742638 1463 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 12 00:39:52.742694 kubelet[1463]: I0712 00:39:52.742690 1463 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 12 00:39:52.745700 kubelet[1463]: I0712 00:39:52.745674 1463 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 12 00:39:52.746934 kubelet[1463]: I0712 00:39:52.746879 1463 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 12 00:39:52.747095 kubelet[1463]: I0712 00:39:52.746926 1463 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.137","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 12 00:39:52.747208 kubelet[1463]: I0712 00:39:52.747147 1463 topology_manager.go:138] "Creating topology manager with none policy" Jul 12 00:39:52.747208 kubelet[1463]: I0712 00:39:52.747156 1463 container_manager_linux.go:303] "Creating device plugin manager" Jul 12 00:39:52.747368 kubelet[1463]: I0712 00:39:52.747342 1463 state_mem.go:36] "Initialized new in-memory state store" Jul 12 00:39:52.752213 kubelet[1463]: I0712 00:39:52.752180 1463 kubelet.go:480] "Attempting to sync node with API server" Jul 12 00:39:52.752213 kubelet[1463]: I0712 00:39:52.752211 1463 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 12 00:39:52.752318 kubelet[1463]: I0712 00:39:52.752239 1463 kubelet.go:386] "Adding apiserver pod source" Jul 12 00:39:52.752318 kubelet[1463]: I0712 00:39:52.752252 1463 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 12 00:39:52.752487 kubelet[1463]: E0712 00:39:52.752457 1463 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:52.752570 kubelet[1463]: E0712 00:39:52.752558 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:52.753499 kubelet[1463]: I0712 00:39:52.753472 1463 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 12 00:39:52.754371 kubelet[1463]: I0712 00:39:52.754342 1463 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Jul 12 00:39:52.754535 kubelet[1463]: W0712 00:39:52.754517 1463 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 12 00:39:52.757201 kubelet[1463]: I0712 00:39:52.757177 1463 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 12 00:39:52.757276 kubelet[1463]: I0712 00:39:52.757225 1463 server.go:1289] "Started kubelet" Jul 12 00:39:52.758000 audit[1463]: AVC avc: denied { mac_admin } for pid=1463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:52.758000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:39:52.758000 audit[1463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000601e60 a1=40007c8ac8 a2=4000601e30 a3=25 items=0 ppid=1 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.758000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:39:52.758000 audit[1463]: AVC avc: denied { mac_admin } for pid=1463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:52.758000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:39:52.758000 audit[1463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005b36a0 a1=40007c8ae0 a2=4000601ef0 a3=25 items=0 ppid=1 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.758000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:39:52.759163 kubelet[1463]: I0712 00:39:52.758840 1463 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 12 00:39:52.759163 kubelet[1463]: I0712 00:39:52.758876 1463 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 12 00:39:52.759627 kubelet[1463]: I0712 00:39:52.759600 1463 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 12 00:39:52.759778 kubelet[1463]: I0712 00:39:52.759703 1463 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 12 00:39:52.760092 kubelet[1463]: I0712 00:39:52.760070 1463 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 12 00:39:52.760220 kubelet[1463]: I0712 00:39:52.760200 1463 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Jul 12 00:39:52.761180 kubelet[1463]: I0712 00:39:52.761157 1463 server.go:317] "Adding debug handlers to kubelet server" Jul 12 00:39:52.765177 kubelet[1463]: E0712 00:39:52.765142 1463 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Jul 12 00:39:52.766851 kubelet[1463]: I0712 00:39:52.766825 1463 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 12 00:39:52.767735 kubelet[1463]: E0712 00:39:52.767697 1463 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 12 00:39:52.768094 kubelet[1463]: E0712 00:39:52.768072 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:52.768139 kubelet[1463]: I0712 00:39:52.768119 1463 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 12 00:39:52.768558 kubelet[1463]: I0712 00:39:52.768531 1463 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 12 00:39:52.768621 kubelet[1463]: I0712 00:39:52.768595 1463 reconciler.go:26] "Reconciler: start to sync state" Jul 12 00:39:52.769819 kubelet[1463]: I0712 00:39:52.769792 1463 factory.go:223] Registration of the containerd container factory successfully Jul 12 00:39:52.769911 kubelet[1463]: I0712 00:39:52.769899 1463 factory.go:223] Registration of the systemd container factory successfully Jul 12 00:39:52.770031 kubelet[1463]: I0712 00:39:52.770010 1463 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 12 00:39:52.784174 kubelet[1463]: E0712 00:39:52.784124 1463 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Jul 12 00:39:52.784661 kubelet[1463]: E0712 00:39:52.784624 1463 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.0.0.137\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Jul 12 00:39:52.784698 kubelet[1463]: E0712 00:39:52.784669 1463 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.137\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 12 00:39:52.786445 kubelet[1463]: I0712 00:39:52.786421 1463 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 12 00:39:52.786445 kubelet[1463]: I0712 00:39:52.786442 1463 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 12 00:39:52.786495 kubelet[1463]: I0712 00:39:52.786460 1463 state_mem.go:36] "Initialized new in-memory state store" Jul 12 00:39:52.786933 kubelet[1463]: E0712 00:39:52.784291 1463 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.137.18515a18d7084b58 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.137,UID:10.0.0.137,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.137,},FirstTimestamp:2025-07-12 00:39:52.75719356 +0000 UTC m=+1.267589236,LastTimestamp:2025-07-12 00:39:52.75719356 +0000 UTC m=+1.267589236,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.137,}" Jul 12 00:39:52.788178 kubelet[1463]: E0712 00:39:52.788104 1463 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.137.18515a18d7a8572b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.137,UID:10.0.0.137,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.137,},FirstTimestamp:2025-07-12 00:39:52.767682347 +0000 UTC m=+1.278078023,LastTimestamp:2025-07-12 00:39:52.767682347 +0000 UTC m=+1.278078023,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.137,}" Jul 12 00:39:52.856000 audit[1488]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.856000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe067b680 a2=0 a3=1 items=0 ppid=1463 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 12 00:39:52.858001 kubelet[1463]: I0712 00:39:52.857969 1463 policy_none.go:49] "None policy: Start" Jul 12 00:39:52.858056 kubelet[1463]: I0712 00:39:52.858011 1463 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 12 00:39:52.858056 kubelet[1463]: I0712 00:39:52.858024 1463 state_mem.go:35] "Initializing new in-memory state store" Jul 12 00:39:52.857000 audit[1489]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.857000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffdc3435a0 a2=0 a3=1 items=0 ppid=1463 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 12 00:39:52.863366 systemd[1]: Created slice kubepods.slice. Jul 12 00:39:52.867879 systemd[1]: Created slice kubepods-burstable.slice. Jul 12 00:39:52.868251 kubelet[1463]: E0712 00:39:52.868226 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:52.870768 systemd[1]: Created slice kubepods-besteffort.slice. Jul 12 00:39:52.881573 kubelet[1463]: E0712 00:39:52.881542 1463 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Jul 12 00:39:52.880000 audit[1463]: AVC avc: denied { mac_admin } for pid=1463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:52.880000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:39:52.880000 audit[1463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000589200 a1=40007c8990 a2=40005891a0 a3=25 items=0 ppid=1 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.880000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:39:52.881913 kubelet[1463]: E0712 00:39:52.881631 1463 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Jul 12 00:39:52.881913 kubelet[1463]: I0712 00:39:52.881804 1463 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 12 00:39:52.881913 kubelet[1463]: I0712 00:39:52.881818 1463 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 12 00:39:52.882478 kubelet[1463]: I0712 00:39:52.882450 1463 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 12 00:39:52.882841 kubelet[1463]: E0712 00:39:52.882771 1463 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 12 00:39:52.882905 kubelet[1463]: E0712 00:39:52.882857 1463 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.137\" not found" Jul 12 00:39:52.862000 audit[1491]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.862000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc4684510 a2=0 a3=1 items=0 ppid=1463 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:39:52.889000 audit[1496]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.889000 audit[1496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcefdf7b0 a2=0 a3=1 items=0 ppid=1463 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:39:52.924000 audit[1501]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.924000 audit[1501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdea64170 a2=0 a3=1 items=0 ppid=1463 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 12 00:39:52.926009 kubelet[1463]: I0712 00:39:52.925920 1463 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Jul 12 00:39:52.927000 audit[1502]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:52.927000 audit[1502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd8d77000 a2=0 a3=1 items=0 ppid=1463 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 12 00:39:52.928778 kubelet[1463]: I0712 00:39:52.928759 1463 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Jul 12 00:39:52.928854 kubelet[1463]: I0712 00:39:52.928843 1463 status_manager.go:230] "Starting to sync pod status with apiserver" Jul 12 00:39:52.928923 kubelet[1463]: I0712 00:39:52.928912 1463 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 12 00:39:52.928971 kubelet[1463]: I0712 00:39:52.928963 1463 kubelet.go:2436] "Starting kubelet main sync loop" Jul 12 00:39:52.929170 kubelet[1463]: E0712 00:39:52.929146 1463 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 12 00:39:52.928000 audit[1503]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1503 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.928000 audit[1503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1fe6040 a2=0 a3=1 items=0 ppid=1463 pid=1503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 12 00:39:52.928000 audit[1504]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1504 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:52.928000 audit[1504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff22e00d0 a2=0 a3=1 items=0 ppid=1463 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 12 00:39:52.929000 audit[1506]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1506 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:52.929000 audit[1506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcb2371a0 a2=0 a3=1 items=0 ppid=1463 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 12 00:39:52.929000 audit[1505]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1505 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.929000 audit[1505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff4c33540 a2=0 a3=1 items=0 ppid=1463 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 12 00:39:52.930000 audit[1507]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1507 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:52.930000 audit[1507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffde07ca90 a2=0 a3=1 items=0 ppid=1463 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 12 00:39:52.930000 audit[1508]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:52.930000 audit[1508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6b24200 a2=0 a3=1 items=0 ppid=1463 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:52.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 12 00:39:52.983270 kubelet[1463]: I0712 00:39:52.983226 1463 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.137" Jul 12 00:39:52.987628 kubelet[1463]: I0712 00:39:52.987583 1463 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.137" Jul 12 00:39:52.987628 kubelet[1463]: E0712 00:39:52.987617 1463 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.137\": node \"10.0.0.137\" not found" Jul 12 00:39:52.996691 kubelet[1463]: E0712 00:39:52.996491 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.018392 sudo[1357]: pam_unix(sudo:session): session closed for user root Jul 12 00:39:53.016000 audit[1357]: USER_END pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:53.016000 audit[1357]: CRED_DISP pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:39:53.019828 sshd[1353]: pam_unix(sshd:session): session closed for user core Jul 12 00:39:53.018000 audit[1353]: USER_END pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:53.019000 audit[1353]: CRED_DISP pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 12 00:39:53.022298 systemd[1]: sshd@6-10.0.0.137:22-10.0.0.1:47134.service: Deactivated successfully. Jul 12 00:39:53.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.137:22-10.0.0.1:47134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:39:53.023008 systemd[1]: session-7.scope: Deactivated successfully. Jul 12 00:39:53.023556 systemd-logind[1206]: Session 7 logged out. Waiting for processes to exit. Jul 12 00:39:53.024335 systemd-logind[1206]: Removed session 7. Jul 12 00:39:53.097320 kubelet[1463]: E0712 00:39:53.097283 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.198458 kubelet[1463]: E0712 00:39:53.198345 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.299559 kubelet[1463]: E0712 00:39:53.299519 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.400679 kubelet[1463]: E0712 00:39:53.400637 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.501595 kubelet[1463]: E0712 00:39:53.501551 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.602187 kubelet[1463]: E0712 00:39:53.602158 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.678509 kubelet[1463]: I0712 00:39:53.678470 1463 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 12 00:39:53.678835 kubelet[1463]: I0712 00:39:53.678635 1463 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 12 00:39:53.702828 kubelet[1463]: E0712 00:39:53.702792 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.753700 kubelet[1463]: E0712 00:39:53.753600 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:53.803148 kubelet[1463]: E0712 00:39:53.803099 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:53.903827 kubelet[1463]: E0712 00:39:53.903779 1463 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.137\" not found" Jul 12 00:39:54.005351 kubelet[1463]: I0712 00:39:54.005256 1463 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 12 00:39:54.005995 env[1218]: time="2025-07-12T00:39:54.005900016Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 12 00:39:54.006288 kubelet[1463]: I0712 00:39:54.006086 1463 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 12 00:39:54.754487 kubelet[1463]: E0712 00:39:54.754434 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:54.757721 kubelet[1463]: I0712 00:39:54.757701 1463 apiserver.go:52] "Watching apiserver" Jul 12 00:39:54.770386 kubelet[1463]: E0712 00:39:54.770349 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-blbbn" podUID="adb47345-25b1-4d84-bdd7-628370ba09cd" Jul 12 00:39:54.774903 systemd[1]: Created slice kubepods-besteffort-pod597192a9_3e8e_4285_bd14_5575d35eadb9.slice. Jul 12 00:39:54.778526 kubelet[1463]: I0712 00:39:54.778496 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7cc39972-c2b1-4a6f-90ee-6d90d9b3f384-xtables-lock\") pod \"kube-proxy-kf7jr\" (UID: \"7cc39972-c2b1-4a6f-90ee-6d90d9b3f384\") " pod="kube-system/kube-proxy-kf7jr" Jul 12 00:39:54.778669 kubelet[1463]: I0712 00:39:54.778655 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-lib-modules\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.779205 kubelet[1463]: I0712 00:39:54.779182 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-var-run-calico\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.779340 kubelet[1463]: I0712 00:39:54.779322 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-xtables-lock\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.780838 kubelet[1463]: I0712 00:39:54.780812 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/adb47345-25b1-4d84-bdd7-628370ba09cd-kubelet-dir\") pod \"csi-node-driver-blbbn\" (UID: \"adb47345-25b1-4d84-bdd7-628370ba09cd\") " pod="calico-system/csi-node-driver-blbbn" Jul 12 00:39:54.780972 kubelet[1463]: I0712 00:39:54.780955 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-cni-log-dir\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781060 kubelet[1463]: I0712 00:39:54.781045 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-flexvol-driver-host\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781216 kubelet[1463]: I0712 00:39:54.781181 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/597192a9-3e8e-4285-bd14-5575d35eadb9-tigera-ca-bundle\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781265 kubelet[1463]: I0712 00:39:54.781226 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zc4sw\" (UniqueName: \"kubernetes.io/projected/597192a9-3e8e-4285-bd14-5575d35eadb9-kube-api-access-zc4sw\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781265 kubelet[1463]: I0712 00:39:54.781251 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nf282\" (UniqueName: \"kubernetes.io/projected/7cc39972-c2b1-4a6f-90ee-6d90d9b3f384-kube-api-access-nf282\") pod \"kube-proxy-kf7jr\" (UID: \"7cc39972-c2b1-4a6f-90ee-6d90d9b3f384\") " pod="kube-system/kube-proxy-kf7jr" Jul 12 00:39:54.781318 kubelet[1463]: I0712 00:39:54.781271 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-cni-bin-dir\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781318 kubelet[1463]: I0712 00:39:54.781294 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-cni-net-dir\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781318 kubelet[1463]: I0712 00:39:54.781311 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/597192a9-3e8e-4285-bd14-5575d35eadb9-node-certs\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781387 kubelet[1463]: I0712 00:39:54.781329 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-policysync\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781387 kubelet[1463]: I0712 00:39:54.781350 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/adb47345-25b1-4d84-bdd7-628370ba09cd-registration-dir\") pod \"csi-node-driver-blbbn\" (UID: \"adb47345-25b1-4d84-bdd7-628370ba09cd\") " pod="calico-system/csi-node-driver-blbbn" Jul 12 00:39:54.781387 kubelet[1463]: I0712 00:39:54.781371 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/adb47345-25b1-4d84-bdd7-628370ba09cd-socket-dir\") pod \"csi-node-driver-blbbn\" (UID: \"adb47345-25b1-4d84-bdd7-628370ba09cd\") " pod="calico-system/csi-node-driver-blbbn" Jul 12 00:39:54.781450 kubelet[1463]: I0712 00:39:54.781389 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/adb47345-25b1-4d84-bdd7-628370ba09cd-varrun\") pod \"csi-node-driver-blbbn\" (UID: \"adb47345-25b1-4d84-bdd7-628370ba09cd\") " pod="calico-system/csi-node-driver-blbbn" Jul 12 00:39:54.781450 kubelet[1463]: I0712 00:39:54.781407 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7cc39972-c2b1-4a6f-90ee-6d90d9b3f384-kube-proxy\") pod \"kube-proxy-kf7jr\" (UID: \"7cc39972-c2b1-4a6f-90ee-6d90d9b3f384\") " pod="kube-system/kube-proxy-kf7jr" Jul 12 00:39:54.781450 kubelet[1463]: I0712 00:39:54.781426 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7cc39972-c2b1-4a6f-90ee-6d90d9b3f384-lib-modules\") pod \"kube-proxy-kf7jr\" (UID: \"7cc39972-c2b1-4a6f-90ee-6d90d9b3f384\") " pod="kube-system/kube-proxy-kf7jr" Jul 12 00:39:54.781450 kubelet[1463]: I0712 00:39:54.781444 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/597192a9-3e8e-4285-bd14-5575d35eadb9-var-lib-calico\") pod \"calico-node-v742w\" (UID: \"597192a9-3e8e-4285-bd14-5575d35eadb9\") " pod="calico-system/calico-node-v742w" Jul 12 00:39:54.781539 kubelet[1463]: I0712 00:39:54.781465 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fbh97\" (UniqueName: \"kubernetes.io/projected/adb47345-25b1-4d84-bdd7-628370ba09cd-kube-api-access-fbh97\") pod \"csi-node-driver-blbbn\" (UID: \"adb47345-25b1-4d84-bdd7-628370ba09cd\") " pod="calico-system/csi-node-driver-blbbn" Jul 12 00:39:54.792704 systemd[1]: Created slice kubepods-besteffort-pod7cc39972_c2b1_4a6f_90ee_6d90d9b3f384.slice. Jul 12 00:39:54.869034 kubelet[1463]: I0712 00:39:54.868987 1463 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 12 00:39:54.882866 kubelet[1463]: I0712 00:39:54.882833 1463 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 12 00:39:54.884272 kubelet[1463]: E0712 00:39:54.884247 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:54.884272 kubelet[1463]: W0712 00:39:54.884268 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:54.884401 kubelet[1463]: E0712 00:39:54.884287 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:54.886198 kubelet[1463]: E0712 00:39:54.886177 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:54.886318 kubelet[1463]: W0712 00:39:54.886303 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:54.886390 kubelet[1463]: E0712 00:39:54.886376 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:54.894301 kubelet[1463]: E0712 00:39:54.894275 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:54.894301 kubelet[1463]: W0712 00:39:54.894296 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:54.894424 kubelet[1463]: E0712 00:39:54.894315 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:54.895444 kubelet[1463]: E0712 00:39:54.895411 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:54.895444 kubelet[1463]: W0712 00:39:54.895437 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:54.895531 kubelet[1463]: E0712 00:39:54.895453 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:54.896027 kubelet[1463]: E0712 00:39:54.896011 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:54.896127 kubelet[1463]: W0712 00:39:54.896113 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:54.896207 kubelet[1463]: E0712 00:39:54.896193 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:55.092072 env[1218]: time="2025-07-12T00:39:55.091954355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-v742w,Uid:597192a9-3e8e-4285-bd14-5575d35eadb9,Namespace:calico-system,Attempt:0,}" Jul 12 00:39:55.094609 kubelet[1463]: E0712 00:39:55.094581 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 12 00:39:55.095125 env[1218]: time="2025-07-12T00:39:55.095088650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kf7jr,Uid:7cc39972-c2b1-4a6f-90ee-6d90d9b3f384,Namespace:kube-system,Attempt:0,}" Jul 12 00:39:55.629288 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2159678326.mount: Deactivated successfully. Jul 12 00:39:55.634399 env[1218]: time="2025-07-12T00:39:55.634351699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.635566 env[1218]: time="2025-07-12T00:39:55.635509021Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.637860 env[1218]: time="2025-07-12T00:39:55.637817775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.639267 env[1218]: time="2025-07-12T00:39:55.639239602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.640045 env[1218]: time="2025-07-12T00:39:55.640019364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.642330 env[1218]: time="2025-07-12T00:39:55.642288713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.645032 env[1218]: time="2025-07-12T00:39:55.645002009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.646791 env[1218]: time="2025-07-12T00:39:55.646759368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:55.670945 env[1218]: time="2025-07-12T00:39:55.670876134Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:39:55.671060 env[1218]: time="2025-07-12T00:39:55.670957527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:39:55.671060 env[1218]: time="2025-07-12T00:39:55.671031821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:39:55.671316 env[1218]: time="2025-07-12T00:39:55.671210860Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:39:55.671316 env[1218]: time="2025-07-12T00:39:55.671295842Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:39:55.671316 env[1218]: time="2025-07-12T00:39:55.671307539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:39:55.671316 env[1218]: time="2025-07-12T00:39:55.671282129Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827 pid=1535 runtime=io.containerd.runc.v2 Jul 12 00:39:55.671579 env[1218]: time="2025-07-12T00:39:55.671536712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a73bc7d49f5547c37a530f22bd491df5d5eaacfe3cfb82ebe1924914291ddf28 pid=1537 runtime=io.containerd.runc.v2 Jul 12 00:39:55.702183 systemd[1]: Started cri-containerd-0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827.scope. Jul 12 00:39:55.703100 systemd[1]: Started cri-containerd-a73bc7d49f5547c37a530f22bd491df5d5eaacfe3cfb82ebe1924914291ddf28.scope. Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.735894 kernel: kauditd_printk_skb: 243 callbacks suppressed Jul 12 00:39:55.735958 kernel: audit: type=1400 audit(1752280795.731:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.735981 kernel: audit: type=1400 audit(1752280795.731:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.740847 kernel: audit: type=1400 audit(1752280795.731:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.740925 kernel: audit: type=1400 audit(1752280795.731:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.745744 kernel: audit: type=1400 audit(1752280795.731:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.745800 kernel: audit: type=1400 audit(1752280795.731:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.748083 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 12 00:39:55.748790 kernel: audit: type=1400 audit(1752280795.731:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.748813 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.752592 kernel: audit: type=1400 audit(1752280795.731:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754814 kubelet[1463]: E0712 00:39:55.754787 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.731000 audit: BPF prog-id=58 op=LOAD Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1537 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336263376434396635353437633337613533306632326264343931 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1537 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336263376434396635353437633337613533306632326264343931 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.738000 audit: BPF prog-id=59 op=LOAD Jul 12 00:39:55.738000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1537 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336263376434396635353437633337613533306632326264343931 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.739000 audit: BPF prog-id=60 op=LOAD Jul 12 00:39:55.739000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1537 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336263376434396635353437633337613533306632326264343931 Jul 12 00:39:55.741000 audit: BPF prog-id=60 op=UNLOAD Jul 12 00:39:55.741000 audit: BPF prog-id=59 op=UNLOAD Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.741000 audit: BPF prog-id=61 op=LOAD Jul 12 00:39:55.741000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1537 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137336263376434396635353437633337613533306632326264343931 Jul 12 00:39:55.751000 audit: BPF prog-id=62 op=LOAD Jul 12 00:39:55.752000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.752000 audit[1557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1535 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313862383438353761303632316531663431623239323939646130 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1535 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313862383438353761303632316531663431623239323939646130 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit: BPF prog-id=63 op=LOAD Jul 12 00:39:55.754000 audit[1557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1535 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313862383438353761303632316531663431623239323939646130 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit: BPF prog-id=64 op=LOAD Jul 12 00:39:55.754000 audit[1557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1535 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313862383438353761303632316531663431623239323939646130 Jul 12 00:39:55.754000 audit: BPF prog-id=64 op=UNLOAD Jul 12 00:39:55.754000 audit: BPF prog-id=63 op=UNLOAD Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:55.754000 audit: BPF prog-id=65 op=LOAD Jul 12 00:39:55.754000 audit[1557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1535 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:55.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039313862383438353761303632316531663431623239323939646130 Jul 12 00:39:55.769316 env[1218]: time="2025-07-12T00:39:55.768531376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kf7jr,Uid:7cc39972-c2b1-4a6f-90ee-6d90d9b3f384,Namespace:kube-system,Attempt:0,} returns sandbox id \"a73bc7d49f5547c37a530f22bd491df5d5eaacfe3cfb82ebe1924914291ddf28\"" Jul 12 00:39:55.769986 kubelet[1463]: E0712 00:39:55.769963 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 12 00:39:55.771615 env[1218]: time="2025-07-12T00:39:55.771579640Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\"" Jul 12 00:39:55.772368 env[1218]: time="2025-07-12T00:39:55.772318989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-v742w,Uid:597192a9-3e8e-4285-bd14-5575d35eadb9,Namespace:calico-system,Attempt:0,} returns sandbox id \"0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827\"" Jul 12 00:39:56.754956 kubelet[1463]: E0712 00:39:56.754919 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:56.913398 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount664725075.mount: Deactivated successfully. Jul 12 00:39:56.930545 kubelet[1463]: E0712 00:39:56.930490 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-blbbn" podUID="adb47345-25b1-4d84-bdd7-628370ba09cd" Jul 12 00:39:57.396984 env[1218]: time="2025-07-12T00:39:57.396932571Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:57.398323 env[1218]: time="2025-07-12T00:39:57.398273389Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c26522e54bad2e6bfbb1bf11500833c94433076a3fa38436a2ec496a422c5455,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:57.400055 env[1218]: time="2025-07-12T00:39:57.400029519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:57.401085 env[1218]: time="2025-07-12T00:39:57.401062183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4796ef3e43efa5ed2a5b015c18f81d3c2fe3aea36f555ea643cc01827eb65e51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:57.401488 env[1218]: time="2025-07-12T00:39:57.401451491Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\" returns image reference \"sha256:c26522e54bad2e6bfbb1bf11500833c94433076a3fa38436a2ec496a422c5455\"" Jul 12 00:39:57.403115 env[1218]: time="2025-07-12T00:39:57.403083111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 12 00:39:57.405262 env[1218]: time="2025-07-12T00:39:57.405227180Z" level=info msg="CreateContainer within sandbox \"a73bc7d49f5547c37a530f22bd491df5d5eaacfe3cfb82ebe1924914291ddf28\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 12 00:39:57.415979 env[1218]: time="2025-07-12T00:39:57.415943979Z" level=info msg="CreateContainer within sandbox \"a73bc7d49f5547c37a530f22bd491df5d5eaacfe3cfb82ebe1924914291ddf28\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"85f845039de762a2c5f4f87afe0fdac3675e44ddf3413a74628af438bcb9f689\"" Jul 12 00:39:57.416927 env[1218]: time="2025-07-12T00:39:57.416897220Z" level=info msg="StartContainer for \"85f845039de762a2c5f4f87afe0fdac3675e44ddf3413a74628af438bcb9f689\"" Jul 12 00:39:57.434517 systemd[1]: Started cri-containerd-85f845039de762a2c5f4f87afe0fdac3675e44ddf3413a74628af438bcb9f689.scope. Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1537 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663834353033396465373632613263356634663837616665306664 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit: BPF prog-id=66 op=LOAD Jul 12 00:39:57.480000 audit[1609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1537 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663834353033396465373632613263356634663837616665306664 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit: BPF prog-id=67 op=LOAD Jul 12 00:39:57.480000 audit[1609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1537 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663834353033396465373632613263356634663837616665306664 Jul 12 00:39:57.480000 audit: BPF prog-id=67 op=UNLOAD Jul 12 00:39:57.480000 audit: BPF prog-id=66 op=UNLOAD Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:57.480000 audit: BPF prog-id=68 op=LOAD Jul 12 00:39:57.480000 audit[1609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1537 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663834353033396465373632613263356634663837616665306664 Jul 12 00:39:57.498190 env[1218]: time="2025-07-12T00:39:57.497232599Z" level=info msg="StartContainer for \"85f845039de762a2c5f4f87afe0fdac3675e44ddf3413a74628af438bcb9f689\" returns successfully" Jul 12 00:39:57.735000 audit[1674]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.735000 audit[1674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6972800 a2=0 a3=1 items=0 ppid=1621 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 12 00:39:57.735000 audit[1673]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.735000 audit[1673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef66c090 a2=0 a3=1 items=0 ppid=1621 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 12 00:39:57.736000 audit[1677]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.736000 audit[1677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc04f0b50 a2=0 a3=1 items=0 ppid=1621 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 12 00:39:57.737000 audit[1678]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.737000 audit[1678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9f1fe00 a2=0 a3=1 items=0 ppid=1621 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 12 00:39:57.737000 audit[1679]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.737000 audit[1679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8722680 a2=0 a3=1 items=0 ppid=1621 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 12 00:39:57.738000 audit[1681]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.738000 audit[1681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9149d50 a2=0 a3=1 items=0 ppid=1621 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 12 00:39:57.756003 kubelet[1463]: E0712 00:39:57.755955 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:57.837000 audit[1682]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.837000 audit[1682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe940e110 a2=0 a3=1 items=0 ppid=1621 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 12 00:39:57.842000 audit[1684]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.842000 audit[1684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc71e7ff0 a2=0 a3=1 items=0 ppid=1621 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 12 00:39:57.844000 audit[1687]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.844000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd21d42b0 a2=0 a3=1 items=0 ppid=1621 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 12 00:39:57.844000 audit[1688]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.844000 audit[1688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd326e30 a2=0 a3=1 items=0 ppid=1621 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 12 00:39:57.849000 audit[1690]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.849000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffe87e010 a2=0 a3=1 items=0 ppid=1621 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 12 00:39:57.850000 audit[1691]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.850000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebd7f2d0 a2=0 a3=1 items=0 ppid=1621 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 12 00:39:57.852000 audit[1693]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.852000 audit[1693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeb978ba0 a2=0 a3=1 items=0 ppid=1621 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 12 00:39:57.854000 audit[1696]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.854000 audit[1696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe5814ed0 a2=0 a3=1 items=0 ppid=1621 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 12 00:39:57.857000 audit[1697]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.857000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8bc51b0 a2=0 a3=1 items=0 ppid=1621 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 12 00:39:57.859000 audit[1699]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.859000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9d60ea0 a2=0 a3=1 items=0 ppid=1621 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 12 00:39:57.860000 audit[1700]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.860000 audit[1700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdba2dcf0 a2=0 a3=1 items=0 ppid=1621 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 12 00:39:57.862000 audit[1702]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.862000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff665e0d0 a2=0 a3=1 items=0 ppid=1621 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 12 00:39:57.866000 audit[1705]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.866000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4fdc040 a2=0 a3=1 items=0 ppid=1621 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 12 00:39:57.870000 audit[1708]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.870000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf239250 a2=0 a3=1 items=0 ppid=1621 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 12 00:39:57.871000 audit[1709]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.871000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeb79c110 a2=0 a3=1 items=0 ppid=1621 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 12 00:39:57.873000 audit[1711]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.873000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffde800af0 a2=0 a3=1 items=0 ppid=1621 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:39:57.907000 audit[1715]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.907000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc8542b20 a2=0 a3=1 items=0 ppid=1621 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:39:57.909000 audit[1716]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.909000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedcf9770 a2=0 a3=1 items=0 ppid=1621 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 12 00:39:57.911000 audit[1718]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:39:57.911000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffbcbd7f0 a2=0 a3=1 items=0 ppid=1621 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 12 00:39:57.913437 systemd[1]: run-containerd-runc-k8s.io-85f845039de762a2c5f4f87afe0fdac3675e44ddf3413a74628af438bcb9f689-runc.x8jgsP.mount: Deactivated successfully. Jul 12 00:39:57.939406 kubelet[1463]: E0712 00:39:57.939378 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 12 00:39:57.940000 audit[1724]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:39:57.940000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff5116400 a2=0 a3=1 items=0 ppid=1621 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:57.963000 audit[1724]: NETFILTER_CFG table=nat:40 family=2 entries=49 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:39:57.963000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23388 a0=3 a1=fffff5116400 a2=0 a3=1 items=0 ppid=1621 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:57.972000 audit[1732]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.972000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc23236e0 a2=0 a3=1 items=0 ppid=1621 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 12 00:39:57.975000 audit[1734]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.975000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe04d3690 a2=0 a3=1 items=0 ppid=1621 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.975000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 12 00:39:57.978000 audit[1737]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.978000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe8077560 a2=0 a3=1 items=0 ppid=1621 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 12 00:39:57.979000 audit[1738]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.979000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffecdd7070 a2=0 a3=1 items=0 ppid=1621 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 12 00:39:57.981000 audit[1740]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.981000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd76e7690 a2=0 a3=1 items=0 ppid=1621 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 12 00:39:57.983000 audit[1741]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.983000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2422c60 a2=0 a3=1 items=0 ppid=1621 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 12 00:39:57.985000 audit[1743]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.985000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffebedeb10 a2=0 a3=1 items=0 ppid=1621 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 12 00:39:57.988106 kubelet[1463]: E0712 00:39:57.987989 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.988106 kubelet[1463]: W0712 00:39:57.988052 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.988106 kubelet[1463]: E0712 00:39:57.988076 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.988507 kubelet[1463]: E0712 00:39:57.988482 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.988563 kubelet[1463]: W0712 00:39:57.988507 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.988563 kubelet[1463]: E0712 00:39:57.988552 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.991838 kubelet[1463]: E0712 00:39:57.991617 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.991838 kubelet[1463]: W0712 00:39:57.991642 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.991838 kubelet[1463]: E0712 00:39:57.991659 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.992002 kubelet[1463]: E0712 00:39:57.991888 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.992002 kubelet[1463]: W0712 00:39:57.991897 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.992002 kubelet[1463]: E0712 00:39:57.991907 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.992201 kubelet[1463]: E0712 00:39:57.992078 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.992201 kubelet[1463]: W0712 00:39:57.992087 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.992201 kubelet[1463]: E0712 00:39:57.992095 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.992406 kubelet[1463]: E0712 00:39:57.992224 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.992406 kubelet[1463]: W0712 00:39:57.992233 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.992406 kubelet[1463]: E0712 00:39:57.992241 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.992406 kubelet[1463]: E0712 00:39:57.992361 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.992406 kubelet[1463]: W0712 00:39:57.992367 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.992406 kubelet[1463]: E0712 00:39:57.992374 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.992545 kubelet[1463]: E0712 00:39:57.992491 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.992545 kubelet[1463]: W0712 00:39:57.992498 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.992545 kubelet[1463]: E0712 00:39:57.992505 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.992667 kubelet[1463]: E0712 00:39:57.992647 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.992667 kubelet[1463]: W0712 00:39:57.992666 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.992725 kubelet[1463]: E0712 00:39:57.992674 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.991000 audit[1750]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.991000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdc7e8680 a2=0 a3=1 items=0 ppid=1621 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 12 00:39:57.993071 kubelet[1463]: E0712 00:39:57.993035 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.993071 kubelet[1463]: W0712 00:39:57.993053 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.993071 kubelet[1463]: E0712 00:39:57.993064 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.993227 kubelet[1463]: E0712 00:39:57.993213 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.993256 kubelet[1463]: W0712 00:39:57.993231 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.993256 kubelet[1463]: E0712 00:39:57.993240 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.993391 kubelet[1463]: E0712 00:39:57.993375 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.993419 kubelet[1463]: W0712 00:39:57.993391 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.993419 kubelet[1463]: E0712 00:39:57.993400 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.993663 kubelet[1463]: E0712 00:39:57.993646 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.993663 kubelet[1463]: W0712 00:39:57.993661 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.993723 kubelet[1463]: E0712 00:39:57.993673 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.993000 audit[1758]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.993000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8ae95f0 a2=0 a3=1 items=0 ppid=1621 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 12 00:39:57.994083 kubelet[1463]: E0712 00:39:57.993857 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.994083 kubelet[1463]: W0712 00:39:57.993872 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.994083 kubelet[1463]: E0712 00:39:57.993900 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.994155 kubelet[1463]: E0712 00:39:57.994124 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.994155 kubelet[1463]: W0712 00:39:57.994139 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.994155 kubelet[1463]: E0712 00:39:57.994153 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.995058 kubelet[1463]: E0712 00:39:57.995039 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.995058 kubelet[1463]: W0712 00:39:57.995055 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.995139 kubelet[1463]: E0712 00:39:57.995068 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.995288 kubelet[1463]: E0712 00:39:57.995273 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.995288 kubelet[1463]: W0712 00:39:57.995286 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.995351 kubelet[1463]: E0712 00:39:57.995295 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.995456 kubelet[1463]: E0712 00:39:57.995445 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.995456 kubelet[1463]: W0712 00:39:57.995455 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.995506 kubelet[1463]: E0712 00:39:57.995463 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.995595 kubelet[1463]: E0712 00:39:57.995584 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.995595 kubelet[1463]: W0712 00:39:57.995594 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.995644 kubelet[1463]: E0712 00:39:57.995602 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.995740 kubelet[1463]: E0712 00:39:57.995723 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:57.995765 kubelet[1463]: W0712 00:39:57.995743 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:57.995765 kubelet[1463]: E0712 00:39:57.995757 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:57.996000 audit[1769]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.996000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff7add850 a2=0 a3=1 items=0 ppid=1621 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 12 00:39:57.997000 audit[1770]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:57.997000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5dca4e0 a2=0 a3=1 items=0 ppid=1621 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:57.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 12 00:39:58.001000 audit[1772]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.001000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff30b1de0 a2=0 a3=1 items=0 ppid=1621 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 12 00:39:58.004000 audit[1775]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.004000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe43801a0 a2=0 a3=1 items=0 ppid=1621 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 12 00:39:58.008000 audit[1778]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.008000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7b09140 a2=0 a3=1 items=0 ppid=1621 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 12 00:39:58.009000 audit[1779]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.009000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc01f8140 a2=0 a3=1 items=0 ppid=1621 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 12 00:39:58.011467 kubelet[1463]: E0712 00:39:58.010644 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.011467 kubelet[1463]: W0712 00:39:58.010667 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.011467 kubelet[1463]: E0712 00:39:58.010693 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.011467 kubelet[1463]: E0712 00:39:58.010930 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.011467 kubelet[1463]: W0712 00:39:58.010940 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.011467 kubelet[1463]: E0712 00:39:58.010949 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.011467 kubelet[1463]: E0712 00:39:58.011183 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.011467 kubelet[1463]: W0712 00:39:58.011193 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.011467 kubelet[1463]: E0712 00:39:58.011202 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.011467 kubelet[1463]: E0712 00:39:58.011371 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.011726 kubelet[1463]: W0712 00:39:58.011379 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.011726 kubelet[1463]: E0712 00:39:58.011386 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.011726 kubelet[1463]: E0712 00:39:58.011520 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.011726 kubelet[1463]: W0712 00:39:58.011528 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.011726 kubelet[1463]: E0712 00:39:58.011535 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.011726 kubelet[1463]: E0712 00:39:58.011716 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.011726 kubelet[1463]: W0712 00:39:58.011724 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.011726 kubelet[1463]: E0712 00:39:58.011742 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.013070 kubelet[1463]: E0712 00:39:58.012469 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.013070 kubelet[1463]: W0712 00:39:58.012512 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.013070 kubelet[1463]: E0712 00:39:58.012528 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.013070 kubelet[1463]: E0712 00:39:58.012854 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.013070 kubelet[1463]: W0712 00:39:58.012865 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.013070 kubelet[1463]: E0712 00:39:58.012875 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.013070 kubelet[1463]: E0712 00:39:58.013067 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.013283 kubelet[1463]: W0712 00:39:58.013095 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.013283 kubelet[1463]: E0712 00:39:58.013104 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.013283 kubelet[1463]: E0712 00:39:58.013270 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.013283 kubelet[1463]: W0712 00:39:58.013278 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.013363 kubelet[1463]: E0712 00:39:58.013286 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.011000 audit[1788]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.011000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc151c160 a2=0 a3=1 items=0 ppid=1621 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:39:58.013696 kubelet[1463]: E0712 00:39:58.013456 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.013696 kubelet[1463]: W0712 00:39:58.013466 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.013696 kubelet[1463]: E0712 00:39:58.013486 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.014485 kubelet[1463]: E0712 00:39:58.014450 1463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:39:58.014526 kubelet[1463]: W0712 00:39:58.014485 1463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:39:58.014556 kubelet[1463]: E0712 00:39:58.014529 1463 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:39:58.015000 audit[1796]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.015000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe7a44d40 a2=0 a3=1 items=0 ppid=1621 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:39:58.016000 audit[1797]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.016000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe17b13b0 a2=0 a3=1 items=0 ppid=1621 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 12 00:39:58.019000 audit[1799]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.019000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe54ae190 a2=0 a3=1 items=0 ppid=1621 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 12 00:39:58.020000 audit[1800]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.020000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7d9a340 a2=0 a3=1 items=0 ppid=1621 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 12 00:39:58.023000 audit[1802]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.023000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffca082fe0 a2=0 a3=1 items=0 ppid=1621 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:39:58.026000 audit[1805]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:39:58.026000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe1a56530 a2=0 a3=1 items=0 ppid=1621 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:39:58.029000 audit[1807]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 12 00:39:58.029000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffdfe4c490 a2=0 a3=1 items=0 ppid=1621 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.029000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:58.030000 audit[1807]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 12 00:39:58.030000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdfe4c490 a2=0 a3=1 items=0 ppid=1621 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.030000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:58.245843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4155349746.mount: Deactivated successfully. Jul 12 00:39:58.342232 env[1218]: time="2025-07-12T00:39:58.342178555Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:58.343630 env[1218]: time="2025-07-12T00:39:58.343593729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:58.345336 env[1218]: time="2025-07-12T00:39:58.345310819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:58.347181 env[1218]: time="2025-07-12T00:39:58.346329150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:39:58.347263 env[1218]: time="2025-07-12T00:39:58.347235943Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f\"" Jul 12 00:39:58.351922 env[1218]: time="2025-07-12T00:39:58.351868533Z" level=info msg="CreateContainer within sandbox \"0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 12 00:39:58.368575 env[1218]: time="2025-07-12T00:39:58.368529318Z" level=info msg="CreateContainer within sandbox \"0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0cef947a9da70f845548300719f09e439f51f6e443396f598657f5b91a496178\"" Jul 12 00:39:58.369234 env[1218]: time="2025-07-12T00:39:58.369209131Z" level=info msg="StartContainer for \"0cef947a9da70f845548300719f09e439f51f6e443396f598657f5b91a496178\"" Jul 12 00:39:58.387417 systemd[1]: Started cri-containerd-0cef947a9da70f845548300719f09e439f51f6e443396f598657f5b91a496178.scope. Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1535 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656639343761396461373066383435353438333030373139663039 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit: BPF prog-id=69 op=LOAD Jul 12 00:39:58.412000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1535 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656639343761396461373066383435353438333030373139663039 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit: BPF prog-id=70 op=LOAD Jul 12 00:39:58.412000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1535 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656639343761396461373066383435353438333030373139663039 Jul 12 00:39:58.412000 audit: BPF prog-id=70 op=UNLOAD Jul 12 00:39:58.412000 audit: BPF prog-id=69 op=UNLOAD Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:39:58.412000 audit: BPF prog-id=71 op=LOAD Jul 12 00:39:58.412000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1535 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063656639343761396461373066383435353438333030373139663039 Jul 12 00:39:58.432330 env[1218]: time="2025-07-12T00:39:58.429775465Z" level=info msg="StartContainer for \"0cef947a9da70f845548300719f09e439f51f6e443396f598657f5b91a496178\" returns successfully" Jul 12 00:39:58.446600 systemd[1]: cri-containerd-0cef947a9da70f845548300719f09e439f51f6e443396f598657f5b91a496178.scope: Deactivated successfully. Jul 12 00:39:58.453000 audit: BPF prog-id=71 op=UNLOAD Jul 12 00:39:58.495000 audit[1856]: NETFILTER_CFG table=filter:65 family=2 entries=12 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:39:58.495000 audit[1856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe8edb020 a2=0 a3=1 items=0 ppid=1621 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:58.503000 audit[1856]: NETFILTER_CFG table=nat:66 family=2 entries=46 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:39:58.503000 audit[1856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14964 a0=3 a1=ffffe8edb020 a2=0 a3=1 items=0 ppid=1621 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:58.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:58.616443 env[1218]: time="2025-07-12T00:39:58.616383190Z" level=info msg="shim disconnected" id=0cef947a9da70f845548300719f09e439f51f6e443396f598657f5b91a496178 Jul 12 00:39:58.616443 env[1218]: time="2025-07-12T00:39:58.616439905Z" level=warning msg="cleaning up after shim disconnected" id=0cef947a9da70f845548300719f09e439f51f6e443396f598657f5b91a496178 namespace=k8s.io Jul 12 00:39:58.616443 env[1218]: time="2025-07-12T00:39:58.616450283Z" level=info msg="cleaning up dead shim" Jul 12 00:39:58.624629 env[1218]: time="2025-07-12T00:39:58.624579117Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:39:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1857 runtime=io.containerd.runc.v2\n" Jul 12 00:39:58.756384 kubelet[1463]: E0712 00:39:58.756263 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:39:58.929768 kubelet[1463]: E0712 00:39:58.929366 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-blbbn" podUID="adb47345-25b1-4d84-bdd7-628370ba09cd" Jul 12 00:39:58.944291 kubelet[1463]: E0712 00:39:58.941966 1463 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 12 00:39:58.944421 env[1218]: time="2025-07-12T00:39:58.943347273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 12 00:39:58.958503 kubelet[1463]: I0712 00:39:58.958420 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-kf7jr" podStartSLOduration=4.327190422 podStartE2EDuration="5.958402628s" podCreationTimestamp="2025-07-12 00:39:53 +0000 UTC" firstStartedPulling="2025-07-12 00:39:55.771173969 +0000 UTC m=+4.281569645" lastFinishedPulling="2025-07-12 00:39:57.402386174 +0000 UTC m=+5.912781851" observedRunningTime="2025-07-12 00:39:57.947791047 +0000 UTC m=+6.458186724" watchObservedRunningTime="2025-07-12 00:39:58.958402628 +0000 UTC m=+7.468798304" Jul 12 00:39:59.521000 audit[1875]: NETFILTER_CFG table=filter:67 family=2 entries=12 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:39:59.521000 audit[1875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff5aec8d0 a2=0 a3=1 items=0 ppid=1621 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:59.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:59.543000 audit[1875]: NETFILTER_CFG table=nat:68 family=2 entries=58 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:39:59.543000 audit[1875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20628 a0=3 a1=fffff5aec8d0 a2=0 a3=1 items=0 ppid=1621 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:39:59.543000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:39:59.756518 kubelet[1463]: E0712 00:39:59.756457 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:00.757345 kubelet[1463]: E0712 00:40:00.757306 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:00.930485 kubelet[1463]: E0712 00:40:00.929651 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-blbbn" podUID="adb47345-25b1-4d84-bdd7-628370ba09cd" Jul 12 00:40:01.158080 env[1218]: time="2025-07-12T00:40:01.157982103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:01.160133 env[1218]: time="2025-07-12T00:40:01.160083330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:01.163988 env[1218]: time="2025-07-12T00:40:01.163946278Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:01.166515 env[1218]: time="2025-07-12T00:40:01.166484894Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:01.167027 env[1218]: time="2025-07-12T00:40:01.167004028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588\"" Jul 12 00:40:01.171384 env[1218]: time="2025-07-12T00:40:01.171354151Z" level=info msg="CreateContainer within sandbox \"0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 12 00:40:01.194688 env[1218]: time="2025-07-12T00:40:01.194620092Z" level=info msg="CreateContainer within sandbox \"0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2\"" Jul 12 00:40:01.196632 env[1218]: time="2025-07-12T00:40:01.195357920Z" level=info msg="StartContainer for \"b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2\"" Jul 12 00:40:01.213013 systemd[1]: run-containerd-runc-k8s.io-b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2-runc.811c6I.mount: Deactivated successfully. Jul 12 00:40:01.215352 systemd[1]: Started cri-containerd-b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2.scope. Jul 12 00:40:01.244096 kernel: kauditd_printk_skb: 358 callbacks suppressed Jul 12 00:40:01.244200 kernel: audit: type=1400 audit(1752280801.236:530): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.244223 kernel: audit: type=1300 audit(1752280801.236:530): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=1535 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:01.244242 kernel: audit: type=1327 audit(1752280801.236:530): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626165333035346465313737323230393737303961656234613962 Jul 12 00:40:01.236000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.236000 audit[1884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=1535 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:01.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626165333035346465313737323230393737303961656234613962 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.252424 kernel: audit: type=1400 audit(1752280801.238:531): avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.252472 kernel: audit: type=1400 audit(1752280801.238:531): avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.260051 kernel: audit: type=1400 audit(1752280801.238:531): avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.262819 kernel: audit: type=1400 audit(1752280801.238:531): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.262900 kernel: audit: type=1400 audit(1752280801.238:531): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.268126 kernel: audit: type=1400 audit(1752280801.238:531): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.268198 kernel: audit: type=1400 audit(1752280801.238:531): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.238000 audit: BPF prog-id=72 op=LOAD Jul 12 00:40:01.238000 audit[1884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=1535 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:01.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626165333035346465313737323230393737303961656234613962 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.239000 audit: BPF prog-id=73 op=LOAD Jul 12 00:40:01.239000 audit[1884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=1535 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:01.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626165333035346465313737323230393737303961656234613962 Jul 12 00:40:01.243000 audit: BPF prog-id=73 op=UNLOAD Jul 12 00:40:01.243000 audit: BPF prog-id=72 op=UNLOAD Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:01.243000 audit: BPF prog-id=74 op=LOAD Jul 12 00:40:01.243000 audit[1884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=1535 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:01.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232626165333035346465313737323230393737303961656234613962 Jul 12 00:40:01.284044 env[1218]: time="2025-07-12T00:40:01.284001138Z" level=info msg="StartContainer for \"b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2\" returns successfully" Jul 12 00:40:01.757960 kubelet[1463]: E0712 00:40:01.757913 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:01.861767 env[1218]: time="2025-07-12T00:40:01.861690630Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 12 00:40:01.863864 systemd[1]: cri-containerd-b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2.scope: Deactivated successfully. Jul 12 00:40:01.869000 audit: BPF prog-id=74 op=UNLOAD Jul 12 00:40:01.949166 kubelet[1463]: I0712 00:40:01.948223 1463 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 12 00:40:02.037627 env[1218]: time="2025-07-12T00:40:02.037506689Z" level=info msg="shim disconnected" id=b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2 Jul 12 00:40:02.037627 env[1218]: time="2025-07-12T00:40:02.037555207Z" level=warning msg="cleaning up after shim disconnected" id=b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2 namespace=k8s.io Jul 12 00:40:02.037627 env[1218]: time="2025-07-12T00:40:02.037566765Z" level=info msg="cleaning up dead shim" Jul 12 00:40:02.045518 env[1218]: time="2025-07-12T00:40:02.045472303Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:40:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1926 runtime=io.containerd.runc.v2\n" Jul 12 00:40:02.181843 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b2bae3054de17722097709aeb4a9bd1fe684959815d2230a602f9277e0c7cba2-rootfs.mount: Deactivated successfully. Jul 12 00:40:02.539000 audit[1940]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:02.539000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe4728580 a2=0 a3=1 items=0 ppid=1621 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:02.539000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:02.550000 audit[1940]: NETFILTER_CFG table=nat:70 family=2 entries=22 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:02.550000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe4728580 a2=0 a3=1 items=0 ppid=1621 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:02.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:02.759005 kubelet[1463]: E0712 00:40:02.758961 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:02.938986 systemd[1]: Created slice kubepods-besteffort-podadb47345_25b1_4d84_bdd7_628370ba09cd.slice. Jul 12 00:40:02.941262 env[1218]: time="2025-07-12T00:40:02.940900154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-blbbn,Uid:adb47345-25b1-4d84-bdd7-628370ba09cd,Namespace:calico-system,Attempt:0,}" Jul 12 00:40:02.958822 env[1218]: time="2025-07-12T00:40:02.958445524Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 12 00:40:03.080863 env[1218]: time="2025-07-12T00:40:03.080796697Z" level=error msg="Failed to destroy network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:03.082226 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b-shm.mount: Deactivated successfully. Jul 12 00:40:03.083280 env[1218]: time="2025-07-12T00:40:03.083218249Z" level=error msg="encountered an error cleaning up failed sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:03.083329 env[1218]: time="2025-07-12T00:40:03.083282351Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-blbbn,Uid:adb47345-25b1-4d84-bdd7-628370ba09cd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:03.083522 kubelet[1463]: E0712 00:40:03.083489 1463 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:03.083592 kubelet[1463]: E0712 00:40:03.083558 1463 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-blbbn" Jul 12 00:40:03.083632 kubelet[1463]: E0712 00:40:03.083596 1463 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-blbbn" Jul 12 00:40:03.083676 kubelet[1463]: E0712 00:40:03.083647 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-blbbn_calico-system(adb47345-25b1-4d84-bdd7-628370ba09cd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-blbbn_calico-system(adb47345-25b1-4d84-bdd7-628370ba09cd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-blbbn" podUID="adb47345-25b1-4d84-bdd7-628370ba09cd" Jul 12 00:40:03.759527 kubelet[1463]: E0712 00:40:03.759486 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:03.956232 kubelet[1463]: I0712 00:40:03.955546 1463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Jul 12 00:40:03.956387 env[1218]: time="2025-07-12T00:40:03.956350296Z" level=info msg="StopPodSandbox for \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\"" Jul 12 00:40:03.978102 env[1218]: time="2025-07-12T00:40:03.978027088Z" level=error msg="StopPodSandbox for \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\" failed" error="failed to destroy network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:03.978597 kubelet[1463]: E0712 00:40:03.978392 1463 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Jul 12 00:40:03.978597 kubelet[1463]: E0712 00:40:03.978467 1463 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b"} Jul 12 00:40:03.978597 kubelet[1463]: E0712 00:40:03.978531 1463 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"adb47345-25b1-4d84-bdd7-628370ba09cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:40:03.978597 kubelet[1463]: E0712 00:40:03.978554 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"adb47345-25b1-4d84-bdd7-628370ba09cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-blbbn" podUID="adb47345-25b1-4d84-bdd7-628370ba09cd" Jul 12 00:40:04.262882 systemd[1]: Created slice kubepods-besteffort-pod52a57074_11f9_4965_8798_0bf14be58f5b.slice. Jul 12 00:40:04.358134 kubelet[1463]: I0712 00:40:04.358091 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ckhcw\" (UniqueName: \"kubernetes.io/projected/52a57074-11f9-4965-8798-0bf14be58f5b-kube-api-access-ckhcw\") pod \"nginx-deployment-7fcdb87857-x7kpd\" (UID: \"52a57074-11f9-4965-8798-0bf14be58f5b\") " pod="default/nginx-deployment-7fcdb87857-x7kpd" Jul 12 00:40:04.568959 env[1218]: time="2025-07-12T00:40:04.567772609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x7kpd,Uid:52a57074-11f9-4965-8798-0bf14be58f5b,Namespace:default,Attempt:0,}" Jul 12 00:40:04.570000 audit[1992]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:04.570000 audit[1992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe4df54b0 a2=0 a3=1 items=0 ppid=1621 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:04.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:04.579000 audit[1992]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:04.579000 audit[1992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe4df54b0 a2=0 a3=1 items=0 ppid=1621 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:04.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:04.637727 env[1218]: time="2025-07-12T00:40:04.637559123Z" level=error msg="Failed to destroy network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:04.638159 env[1218]: time="2025-07-12T00:40:04.638124215Z" level=error msg="encountered an error cleaning up failed sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:04.638283 env[1218]: time="2025-07-12T00:40:04.638255623Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x7kpd,Uid:52a57074-11f9-4965-8798-0bf14be58f5b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:04.638650 kubelet[1463]: E0712 00:40:04.638586 1463 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:04.638755 kubelet[1463]: E0712 00:40:04.638668 1463 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-x7kpd" Jul 12 00:40:04.638755 kubelet[1463]: E0712 00:40:04.638687 1463 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-x7kpd" Jul 12 00:40:04.638823 kubelet[1463]: E0712 00:40:04.638753 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-x7kpd_default(52a57074-11f9-4965-8798-0bf14be58f5b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-x7kpd_default(52a57074-11f9-4965-8798-0bf14be58f5b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-x7kpd" podUID="52a57074-11f9-4965-8798-0bf14be58f5b" Jul 12 00:40:04.639040 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739-shm.mount: Deactivated successfully. Jul 12 00:40:04.759776 kubelet[1463]: E0712 00:40:04.759717 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:04.959291 kubelet[1463]: I0712 00:40:04.959174 1463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Jul 12 00:40:04.960001 env[1218]: time="2025-07-12T00:40:04.959913530Z" level=info msg="StopPodSandbox for \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\"" Jul 12 00:40:04.991495 env[1218]: time="2025-07-12T00:40:04.991431635Z" level=error msg="StopPodSandbox for \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\" failed" error="failed to destroy network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:40:04.991701 kubelet[1463]: E0712 00:40:04.991658 1463 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Jul 12 00:40:04.991785 kubelet[1463]: E0712 00:40:04.991717 1463 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739"} Jul 12 00:40:04.991785 kubelet[1463]: E0712 00:40:04.991765 1463 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"52a57074-11f9-4965-8798-0bf14be58f5b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:40:04.991867 kubelet[1463]: E0712 00:40:04.991794 1463 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"52a57074-11f9-4965-8798-0bf14be58f5b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-x7kpd" podUID="52a57074-11f9-4965-8798-0bf14be58f5b" Jul 12 00:40:05.760324 kubelet[1463]: E0712 00:40:05.760267 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:06.565000 audit[2047]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:06.567778 kernel: kauditd_printk_skb: 46 callbacks suppressed Jul 12 00:40:06.567858 kernel: audit: type=1325 audit(1752280806.565:541): table=filter:73 family=2 entries=12 op=nft_register_rule pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:06.565000 audit[2047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcc3ea060 a2=0 a3=1 items=0 ppid=1621 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:06.573136 kernel: audit: type=1300 audit(1752280806.565:541): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcc3ea060 a2=0 a3=1 items=0 ppid=1621 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:06.573196 kernel: audit: type=1327 audit(1752280806.565:541): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:06.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:06.579000 audit[2047]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:06.579000 audit[2047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcc3ea060 a2=0 a3=1 items=0 ppid=1621 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:06.586570 kernel: audit: type=1325 audit(1752280806.579:542): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:06.586621 kernel: audit: type=1300 audit(1752280806.579:542): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcc3ea060 a2=0 a3=1 items=0 ppid=1621 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:06.586648 kernel: audit: type=1327 audit(1752280806.579:542): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:06.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:06.760894 kubelet[1463]: E0712 00:40:06.760847 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:07.761674 kubelet[1463]: E0712 00:40:07.761622 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:08.178796 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1086211797.mount: Deactivated successfully. Jul 12 00:40:08.534837 env[1218]: time="2025-07-12T00:40:08.534716853Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:08.536540 env[1218]: time="2025-07-12T00:40:08.536499506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:08.540711 env[1218]: time="2025-07-12T00:40:08.540684441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:08.550581 env[1218]: time="2025-07-12T00:40:08.550523706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:08.551118 env[1218]: time="2025-07-12T00:40:08.551077558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9\"" Jul 12 00:40:08.566406 env[1218]: time="2025-07-12T00:40:08.566365611Z" level=info msg="CreateContainer within sandbox \"0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 12 00:40:08.579942 env[1218]: time="2025-07-12T00:40:08.579902776Z" level=info msg="CreateContainer within sandbox \"0918b84857a0621e1f41b29299da08c8b1a9544b4c71e649f2ee6e2e3ffa1827\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fb2c8b5d87d6cc64d36f1b9408673234a2314f6827e7cd4e7988f2900964ee45\"" Jul 12 00:40:08.580482 env[1218]: time="2025-07-12T00:40:08.580457870Z" level=info msg="StartContainer for \"fb2c8b5d87d6cc64d36f1b9408673234a2314f6827e7cd4e7988f2900964ee45\"" Jul 12 00:40:08.595493 systemd[1]: Started cri-containerd-fb2c8b5d87d6cc64d36f1b9408673234a2314f6827e7cd4e7988f2900964ee45.scope. Jul 12 00:40:08.619000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.619000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1535 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:08.626429 kernel: audit: type=1400 audit(1752280808.619:543): avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.626513 kernel: audit: type=1300 audit(1752280808.619:543): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1535 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:08.626537 kernel: audit: type=1327 audit(1752280808.619:543): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662326338623564383764366363363464333666316239343038363733 Jul 12 00:40:08.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662326338623564383764366363363464333666316239343038363733 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.631763 kernel: audit: type=1400 audit(1752280808.621:544): avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.621000 audit: BPF prog-id=75 op=LOAD Jul 12 00:40:08.621000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1535 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:08.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662326338623564383764366363363464333666316239343038363733 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.622000 audit: BPF prog-id=76 op=LOAD Jul 12 00:40:08.622000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1535 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:08.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662326338623564383764366363363464333666316239343038363733 Jul 12 00:40:08.625000 audit: BPF prog-id=76 op=UNLOAD Jul 12 00:40:08.625000 audit: BPF prog-id=75 op=UNLOAD Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { perfmon } for pid=2060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit[2060]: AVC avc: denied { bpf } for pid=2060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:08.625000 audit: BPF prog-id=77 op=LOAD Jul 12 00:40:08.625000 audit[2060]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1535 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:08.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662326338623564383764366363363464333666316239343038363733 Jul 12 00:40:08.655391 env[1218]: time="2025-07-12T00:40:08.655327030Z" level=info msg="StartContainer for \"fb2c8b5d87d6cc64d36f1b9408673234a2314f6827e7cd4e7988f2900964ee45\" returns successfully" Jul 12 00:40:08.762556 kubelet[1463]: E0712 00:40:08.762499 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:08.966374 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 12 00:40:08.966497 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 12 00:40:09.763396 kubelet[1463]: E0712 00:40:09.763355 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:09.971607 kubelet[1463]: I0712 00:40:09.971579 1463 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 12 00:40:10.238000 audit[2158]: AVC avc: denied { write } for pid=2158 comm="tee" name="fd" dev="proc" ino=14090 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:40:10.238000 audit[2158]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf79c7f2 a2=241 a3=1b6 items=1 ppid=2125 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.238000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 12 00:40:10.238000 audit: PATH item=0 name="/dev/fd/63" inode=14086 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:10.238000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:40:10.239000 audit[2161]: AVC avc: denied { write } for pid=2161 comm="tee" name="fd" dev="proc" ino=14094 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:40:10.239000 audit[2161]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeaa337e1 a2=241 a3=1b6 items=1 ppid=2131 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.239000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 12 00:40:10.239000 audit: PATH item=0 name="/dev/fd/63" inode=14087 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:10.239000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:40:10.248000 audit[2184]: AVC avc: denied { write } for pid=2184 comm="tee" name="fd" dev="proc" ino=14601 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:40:10.248000 audit[2184]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5e5a7f0 a2=241 a3=1b6 items=1 ppid=2133 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.248000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 12 00:40:10.248000 audit: PATH item=0 name="/dev/fd/63" inode=16457 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:10.248000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:40:10.256000 audit[2186]: AVC avc: denied { write } for pid=2186 comm="tee" name="fd" dev="proc" ino=14605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:40:10.256000 audit[2186]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc67e7e0 a2=241 a3=1b6 items=1 ppid=2126 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.256000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 12 00:40:10.256000 audit: PATH item=0 name="/dev/fd/63" inode=14598 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:10.256000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:40:10.260000 audit[2191]: AVC avc: denied { write } for pid=2191 comm="tee" name="fd" dev="proc" ino=16465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:40:10.260000 audit[2191]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe2dc97f1 a2=241 a3=1b6 items=1 ppid=2124 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.260000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 12 00:40:10.260000 audit: PATH item=0 name="/dev/fd/63" inode=16459 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:10.260000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:40:10.265000 audit[2199]: AVC avc: denied { write } for pid=2199 comm="tee" name="fd" dev="proc" ino=14100 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:40:10.265000 audit[2199]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd804a7f0 a2=241 a3=1b6 items=1 ppid=2134 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.265000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 12 00:40:10.265000 audit: PATH item=0 name="/dev/fd/63" inode=16462 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:10.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:40:10.274000 audit[2206]: AVC avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=14104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:40:10.274000 audit[2206]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffebe077f0 a2=241 a3=1b6 items=1 ppid=2127 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.274000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 12 00:40:10.274000 audit: PATH item=0 name="/dev/fd/63" inode=15523 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:10.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit: BPF prog-id=78 op=LOAD Jul 12 00:40:10.408000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdcdf9428 a2=98 a3=ffffdcdf9418 items=0 ppid=2136 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.408000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:40:10.408000 audit: BPF prog-id=78 op=UNLOAD Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit: BPF prog-id=79 op=LOAD Jul 12 00:40:10.408000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdcdf92d8 a2=74 a3=95 items=0 ppid=2136 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.408000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:40:10.408000 audit: BPF prog-id=79 op=UNLOAD Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit: BPF prog-id=80 op=LOAD Jul 12 00:40:10.408000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdcdf9308 a2=40 a3=ffffdcdf9338 items=0 ppid=2136 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.408000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:40:10.408000 audit: BPF prog-id=80 op=UNLOAD Jul 12 00:40:10.408000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.408000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffdcdf9420 a2=50 a3=0 items=0 ppid=2136 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.408000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit: BPF prog-id=81 op=LOAD Jul 12 00:40:10.409000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeb2750c8 a2=98 a3=ffffeb2750b8 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.409000 audit: BPF prog-id=81 op=UNLOAD Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit: BPF prog-id=82 op=LOAD Jul 12 00:40:10.409000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb274d58 a2=74 a3=95 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.409000 audit: BPF prog-id=82 op=UNLOAD Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.409000 audit: BPF prog-id=83 op=LOAD Jul 12 00:40:10.409000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb274db8 a2=94 a3=2 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.409000 audit: BPF prog-id=83 op=UNLOAD Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit: BPF prog-id=84 op=LOAD Jul 12 00:40:10.492000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb274d78 a2=40 a3=ffffeb274da8 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.492000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.492000 audit: BPF prog-id=84 op=UNLOAD Jul 12 00:40:10.492000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.492000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeb274e90 a2=50 a3=0 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.492000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb274de8 a2=28 a3=ffffeb274f18 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb274e18 a2=28 a3=ffffeb274f48 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb274cc8 a2=28 a3=ffffeb274df8 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb274e38 a2=28 a3=ffffeb274f68 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb274e18 a2=28 a3=ffffeb274f48 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb274e08 a2=28 a3=ffffeb274f38 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb274e38 a2=28 a3=ffffeb274f68 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb274e18 a2=28 a3=ffffeb274f48 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb274e38 a2=28 a3=ffffeb274f68 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb274e08 a2=28 a3=ffffeb274f38 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb274e88 a2=28 a3=ffffeb274fc8 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeb274bc0 a2=50 a3=0 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit: BPF prog-id=85 op=LOAD Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeb274bc8 a2=94 a3=5 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit: BPF prog-id=85 op=UNLOAD Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeb274cd0 a2=50 a3=0 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeb274e18 a2=4 a3=3 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.501000 audit[2241]: AVC avc: denied { confidentiality } for pid=2241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:10.501000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb274df8 a2=94 a3=6 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.501000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { confidentiality } for pid=2241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:10.502000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb2745c8 a2=94 a3=83 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.502000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.502000 audit[2241]: AVC avc: denied { confidentiality } for pid=2241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:10.502000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb2745c8 a2=94 a3=83 items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.502000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit: BPF prog-id=86 op=LOAD Jul 12 00:40:10.517000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7ad1fb8 a2=98 a3=ffffd7ad1fa8 items=0 ppid=2136 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.517000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 12 00:40:10.517000 audit: BPF prog-id=86 op=UNLOAD Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit: BPF prog-id=87 op=LOAD Jul 12 00:40:10.517000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7ad1e68 a2=74 a3=95 items=0 ppid=2136 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.517000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 12 00:40:10.517000 audit: BPF prog-id=87 op=UNLOAD Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { perfmon } for pid=2244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit[2244]: AVC avc: denied { bpf } for pid=2244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.517000 audit: BPF prog-id=88 op=LOAD Jul 12 00:40:10.517000 audit[2244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7ad1e98 a2=40 a3=ffffd7ad1ec8 items=0 ppid=2136 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.517000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 12 00:40:10.517000 audit: BPF prog-id=88 op=UNLOAD Jul 12 00:40:10.573576 systemd-networkd[1052]: vxlan.calico: Link UP Jul 12 00:40:10.573587 systemd-networkd[1052]: vxlan.calico: Gained carrier Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit: BPF prog-id=89 op=LOAD Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffedcbbd48 a2=98 a3=ffffedcbbd38 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit: BPF prog-id=89 op=UNLOAD Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit: BPF prog-id=90 op=LOAD Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffedcbba28 a2=74 a3=95 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit: BPF prog-id=90 op=UNLOAD Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit: BPF prog-id=91 op=LOAD Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffedcbba88 a2=94 a3=2 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit: BPF prog-id=91 op=UNLOAD Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffedcbbab8 a2=28 a3=ffffedcbbbe8 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffedcbbae8 a2=28 a3=ffffedcbbc18 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffedcbb998 a2=28 a3=ffffedcbbac8 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffedcbbb08 a2=28 a3=ffffedcbbc38 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffedcbbae8 a2=28 a3=ffffedcbbc18 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffedcbbad8 a2=28 a3=ffffedcbbc08 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffedcbbb08 a2=28 a3=ffffedcbbc38 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffedcbbae8 a2=28 a3=ffffedcbbc18 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffedcbbb08 a2=28 a3=ffffedcbbc38 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffedcbbad8 a2=28 a3=ffffedcbbc08 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffedcbbb58 a2=28 a3=ffffedcbbc98 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.584000 audit: BPF prog-id=92 op=LOAD Jul 12 00:40:10.584000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffedcbb978 a2=40 a3=ffffedcbb9a8 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.584000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.584000 audit: BPF prog-id=92 op=UNLOAD Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffedcbb9a0 a2=50 a3=0 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.585000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffedcbb9a0 a2=50 a3=0 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.585000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit: BPF prog-id=93 op=LOAD Jul 12 00:40:10.585000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffedcbb108 a2=94 a3=2 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.585000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.585000 audit: BPF prog-id=93 op=UNLOAD Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.585000 audit: BPF prog-id=94 op=LOAD Jul 12 00:40:10.585000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffedcbb298 a2=94 a3=30 items=0 ppid=2136 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.585000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit: BPF prog-id=95 op=LOAD Jul 12 00:40:10.588000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff52f6918 a2=98 a3=fffff52f6908 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.588000 audit: BPF prog-id=95 op=UNLOAD Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit: BPF prog-id=96 op=LOAD Jul 12 00:40:10.588000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff52f65a8 a2=74 a3=95 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.588000 audit: BPF prog-id=96 op=UNLOAD Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.588000 audit: BPF prog-id=97 op=LOAD Jul 12 00:40:10.588000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff52f6608 a2=94 a3=2 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.588000 audit: BPF prog-id=97 op=UNLOAD Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.674000 audit: BPF prog-id=98 op=LOAD Jul 12 00:40:10.674000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff52f65c8 a2=40 a3=fffff52f65f8 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.674000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.675000 audit: BPF prog-id=98 op=UNLOAD Jul 12 00:40:10.675000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.675000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff52f66e0 a2=50 a3=0 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.675000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff52f6638 a2=28 a3=fffff52f6768 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff52f6668 a2=28 a3=fffff52f6798 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff52f6518 a2=28 a3=fffff52f6648 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff52f6688 a2=28 a3=fffff52f67b8 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff52f6668 a2=28 a3=fffff52f6798 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff52f6658 a2=28 a3=fffff52f6788 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff52f6688 a2=28 a3=fffff52f67b8 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff52f6668 a2=28 a3=fffff52f6798 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff52f6688 a2=28 a3=fffff52f67b8 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff52f6658 a2=28 a3=fffff52f6788 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.683000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.683000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff52f66d8 a2=28 a3=fffff52f6818 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.683000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff52f6410 a2=50 a3=0 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit: BPF prog-id=99 op=LOAD Jul 12 00:40:10.684000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff52f6418 a2=94 a3=5 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.684000 audit: BPF prog-id=99 op=UNLOAD Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff52f6520 a2=50 a3=0 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff52f6668 a2=4 a3=3 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { confidentiality } for pid=2275 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:10.684000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff52f6648 a2=94 a3=6 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { confidentiality } for pid=2275 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:10.684000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff52f5e18 a2=94 a3=83 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.684000 audit[2275]: AVC avc: denied { confidentiality } for pid=2275 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:10.684000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff52f5e18 a2=94 a3=83 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.684000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.685000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.685000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff52f7858 a2=10 a3=fffff52f7948 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.685000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.685000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.685000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff52f7718 a2=10 a3=fffff52f7808 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.685000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.685000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.685000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff52f7688 a2=10 a3=fffff52f7808 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.685000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.685000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:10.685000 audit[2275]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff52f7688 a2=10 a3=fffff52f7808 items=0 ppid=2136 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.685000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:40:10.697000 audit: BPF prog-id=94 op=UNLOAD Jul 12 00:40:10.754000 audit[2302]: NETFILTER_CFG table=mangle:75 family=2 entries=16 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:10.754000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc38c4d00 a2=0 a3=ffff8ee87fa8 items=0 ppid=2136 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:10.764553 kubelet[1463]: E0712 00:40:10.764516 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:10.766000 audit[2301]: NETFILTER_CFG table=raw:76 family=2 entries=21 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:10.766000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffca637370 a2=0 a3=ffff893e7fa8 items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.766000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:10.767000 audit[2306]: NETFILTER_CFG table=nat:77 family=2 entries=15 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:10.767000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd8139c10 a2=0 a3=ffffa47bcfa8 items=0 ppid=2136 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.767000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:10.768000 audit[2304]: NETFILTER_CFG table=filter:78 family=2 entries=39 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:10.768000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff84d6f50 a2=0 a3=ffff98c20fa8 items=0 ppid=2136 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:10.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:11.764994 kubelet[1463]: E0712 00:40:11.764949 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:12.368853 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL Jul 12 00:40:12.752894 kubelet[1463]: E0712 00:40:12.752851 1463 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:12.765373 kubelet[1463]: E0712 00:40:12.765339 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:13.765524 kubelet[1463]: E0712 00:40:13.765474 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:14.766017 kubelet[1463]: E0712 00:40:14.765961 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:15.766514 kubelet[1463]: E0712 00:40:15.766467 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:16.767437 kubelet[1463]: E0712 00:40:16.767354 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:17.767709 kubelet[1463]: E0712 00:40:17.767650 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:18.768101 kubelet[1463]: E0712 00:40:18.768042 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:18.931537 env[1218]: time="2025-07-12T00:40:18.930985062Z" level=info msg="StopPodSandbox for \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\"" Jul 12 00:40:18.931537 env[1218]: time="2025-07-12T00:40:18.930990345Z" level=info msg="StopPodSandbox for \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\"" Jul 12 00:40:18.985930 kubelet[1463]: I0712 00:40:18.985774 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-v742w" podStartSLOduration=13.207082618 podStartE2EDuration="25.985758538s" podCreationTimestamp="2025-07-12 00:39:53 +0000 UTC" firstStartedPulling="2025-07-12 00:39:55.773420771 +0000 UTC m=+4.283816448" lastFinishedPulling="2025-07-12 00:40:08.552096692 +0000 UTC m=+17.062492368" observedRunningTime="2025-07-12 00:40:08.989499616 +0000 UTC m=+17.499895252" watchObservedRunningTime="2025-07-12 00:40:18.985758538 +0000 UTC m=+27.496154214" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:18.986 [INFO][2346] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:18.986 [INFO][2346] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" iface="eth0" netns="/var/run/netns/cni-653810ec-2e95-a6d8-2125-8003598e977e" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:18.986 [INFO][2346] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" iface="eth0" netns="/var/run/netns/cni-653810ec-2e95-a6d8-2125-8003598e977e" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:18.987 [INFO][2346] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" iface="eth0" netns="/var/run/netns/cni-653810ec-2e95-a6d8-2125-8003598e977e" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:18.987 [INFO][2346] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:18.987 [INFO][2346] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:19.082 [INFO][2360] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" HandleID="k8s-pod-network.5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Workload="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:19.082 [INFO][2360] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:19.082 [INFO][2360] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:19.104 [WARNING][2360] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" HandleID="k8s-pod-network.5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Workload="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:19.104 [INFO][2360] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" HandleID="k8s-pod-network.5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Workload="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:19.105 [INFO][2360] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:40:19.111975 env[1218]: 2025-07-12 00:40:19.108 [INFO][2346] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739" Jul 12 00:40:19.111975 env[1218]: time="2025-07-12T00:40:19.109961684Z" level=info msg="TearDown network for sandbox \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\" successfully" Jul 12 00:40:19.111975 env[1218]: time="2025-07-12T00:40:19.109992100Z" level=info msg="StopPodSandbox for \"5aa74c5f468248332938d429b6cc77a89d615421249cb9eb8eb499bfbbb39739\" returns successfully" Jul 12 00:40:19.111975 env[1218]: time="2025-07-12T00:40:19.110947097Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x7kpd,Uid:52a57074-11f9-4965-8798-0bf14be58f5b,Namespace:default,Attempt:1,}" Jul 12 00:40:19.111418 systemd[1]: run-netns-cni\x2d653810ec\x2d2e95\x2da6d8\x2d2125\x2d8003598e977e.mount: Deactivated successfully. Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:18.995 [INFO][2344] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:18.995 [INFO][2344] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" iface="eth0" netns="/var/run/netns/cni-525ff375-3fd7-a8dd-9b7c-6defea833a62" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:18.995 [INFO][2344] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" iface="eth0" netns="/var/run/netns/cni-525ff375-3fd7-a8dd-9b7c-6defea833a62" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:18.995 [INFO][2344] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" iface="eth0" netns="/var/run/netns/cni-525ff375-3fd7-a8dd-9b7c-6defea833a62" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:18.995 [INFO][2344] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:18.995 [INFO][2344] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:19.082 [INFO][2366] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" HandleID="k8s-pod-network.bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Workload="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:19.082 [INFO][2366] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:19.106 [INFO][2366] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:19.117 [WARNING][2366] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" HandleID="k8s-pod-network.bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Workload="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:19.117 [INFO][2366] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" HandleID="k8s-pod-network.bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Workload="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:19.119 [INFO][2366] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:40:19.126718 env[1218]: 2025-07-12 00:40:19.121 [INFO][2344] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b" Jul 12 00:40:19.128455 env[1218]: time="2025-07-12T00:40:19.126877894Z" level=info msg="TearDown network for sandbox \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\" successfully" Jul 12 00:40:19.128455 env[1218]: time="2025-07-12T00:40:19.126906188Z" level=info msg="StopPodSandbox for \"bb1d6221bffa7090282d4246e17311f93e3f1deb8dd36fe9f1aa44e95fa45b8b\" returns successfully" Jul 12 00:40:19.128160 systemd[1]: run-netns-cni\x2d525ff375\x2d3fd7\x2da8dd\x2d9b7c\x2d6defea833a62.mount: Deactivated successfully. Jul 12 00:40:19.128791 env[1218]: time="2025-07-12T00:40:19.128760155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-blbbn,Uid:adb47345-25b1-4d84-bdd7-628370ba09cd,Namespace:calico-system,Attempt:1,}" Jul 12 00:40:19.223462 systemd-networkd[1052]: cali76964fe8571: Link UP Jul 12 00:40:19.225707 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 12 00:40:19.225799 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali76964fe8571: link becomes ready Jul 12 00:40:19.225622 systemd-networkd[1052]: cali76964fe8571: Gained carrier Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.155 [INFO][2376] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0 nginx-deployment-7fcdb87857- default 52a57074-11f9-4965-8798-0bf14be58f5b 1205 0 2025-07-12 00:40:04 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.137 nginx-deployment-7fcdb87857-x7kpd eth0 default [] [] [kns.default ksa.default.default] cali76964fe8571 [] [] }} ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.155 [INFO][2376] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.183 [INFO][2405] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" HandleID="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Workload="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.183 [INFO][2405] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" HandleID="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Workload="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000136e30), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.137", "pod":"nginx-deployment-7fcdb87857-x7kpd", "timestamp":"2025-07-12 00:40:19.18360383 +0000 UTC"}, Hostname:"10.0.0.137", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.183 [INFO][2405] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.183 [INFO][2405] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.183 [INFO][2405] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.137' Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.193 [INFO][2405] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.199 [INFO][2405] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.204 [INFO][2405] ipam/ipam.go 511: Trying affinity for 192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.206 [INFO][2405] ipam/ipam.go 158: Attempting to load block cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.209 [INFO][2405] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.209 [INFO][2405] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.10.0/26 handle="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.211 [INFO][2405] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58 Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.214 [INFO][2405] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.10.0/26 handle="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.219 [INFO][2405] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.10.1/26] block=192.168.10.0/26 handle="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.219 [INFO][2405] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.10.1/26] handle="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" host="10.0.0.137" Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.219 [INFO][2405] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:40:19.240095 env[1218]: 2025-07-12 00:40:19.219 [INFO][2405] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.10.1/26] IPv6=[] ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" HandleID="k8s-pod-network.49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Workload="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.240684 env[1218]: 2025-07-12 00:40:19.221 [INFO][2376] cni-plugin/k8s.go 418: Populated endpoint ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"52a57074-11f9-4965-8798-0bf14be58f5b", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-x7kpd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali76964fe8571", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:19.240684 env[1218]: 2025-07-12 00:40:19.221 [INFO][2376] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.10.1/32] ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.240684 env[1218]: 2025-07-12 00:40:19.221 [INFO][2376] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali76964fe8571 ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.240684 env[1218]: 2025-07-12 00:40:19.226 [INFO][2376] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.240684 env[1218]: 2025-07-12 00:40:19.226 [INFO][2376] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"52a57074-11f9-4965-8798-0bf14be58f5b", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 40, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58", Pod:"nginx-deployment-7fcdb87857-x7kpd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali76964fe8571", MAC:"a6:78:e2:ec:41:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:19.240684 env[1218]: 2025-07-12 00:40:19.233 [INFO][2376] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58" Namespace="default" Pod="nginx-deployment-7fcdb87857-x7kpd" WorkloadEndpoint="10.0.0.137-k8s-nginx--deployment--7fcdb87857--x7kpd-eth0" Jul 12 00:40:19.249908 env[1218]: time="2025-07-12T00:40:19.249795693Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:40:19.249908 env[1218]: time="2025-07-12T00:40:19.249880696Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:40:19.249908 env[1218]: time="2025-07-12T00:40:19.249893022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:40:19.250072 env[1218]: time="2025-07-12T00:40:19.250015163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58 pid=2444 runtime=io.containerd.runc.v2 Jul 12 00:40:19.244000 audit[2430]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:19.260285 systemd[1]: Started cri-containerd-49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58.scope. Jul 12 00:40:19.262354 kernel: kauditd_printk_skb: 610 callbacks suppressed Jul 12 00:40:19.262387 kernel: audit: type=1325 audit(1752280819.244:658): table=filter:79 family=2 entries=38 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:19.244000 audit[2430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=ffffed939fb0 a2=0 a3=ffff8e448fa8 items=0 ppid=2136 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.267744 kernel: audit: type=1300 audit(1752280819.244:658): arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=ffffed939fb0 a2=0 a3=ffff8e448fa8 items=0 ppid=2136 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.267813 kernel: audit: type=1327 audit(1752280819.244:658): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:19.244000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.303496 kernel: audit: type=1400 audit(1752280819.296:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.303557 kernel: audit: type=1400 audit(1752280819.296:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.306692 kernel: audit: type=1400 audit(1752280819.296:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.306765 kernel: audit: type=1400 audit(1752280819.296:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.307101 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.311547 kernel: audit: type=1400 audit(1752280819.296:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.314028 kernel: audit: type=1400 audit(1752280819.296:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.316920 kernel: audit: type=1400 audit(1752280819.296:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.299000 audit: BPF prog-id=100 op=LOAD Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2444 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623061323233616334653436366139323539323438356639353033 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2444 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623061323233616334653436366139323539323438356639353033 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit: BPF prog-id=101 op=LOAD Jul 12 00:40:19.302000 audit[2454]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2444 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623061323233616334653436366139323539323438356639353033 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit: BPF prog-id=102 op=LOAD Jul 12 00:40:19.302000 audit[2454]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2444 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623061323233616334653436366139323539323438356639353033 Jul 12 00:40:19.302000 audit: BPF prog-id=102 op=UNLOAD Jul 12 00:40:19.302000 audit: BPF prog-id=101 op=UNLOAD Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.302000 audit: BPF prog-id=103 op=LOAD Jul 12 00:40:19.302000 audit[2454]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2444 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623061323233616334653436366139323539323438356639353033 Jul 12 00:40:19.334694 systemd-networkd[1052]: cali3508ae0595d: Link UP Jul 12 00:40:19.336112 systemd-networkd[1052]: cali3508ae0595d: Gained carrier Jul 12 00:40:19.336753 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3508ae0595d: link becomes ready Jul 12 00:40:19.343565 env[1218]: time="2025-07-12T00:40:19.343511225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x7kpd,Uid:52a57074-11f9-4965-8798-0bf14be58f5b,Namespace:default,Attempt:1,} returns sandbox id \"49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58\"" Jul 12 00:40:19.345077 env[1218]: time="2025-07-12T00:40:19.345044471Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.170 [INFO][2390] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.137-k8s-csi--node--driver--blbbn-eth0 csi-node-driver- calico-system adb47345-25b1-4d84-bdd7-628370ba09cd 1206 0 2025-07-12 00:39:53 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.137 csi-node-driver-blbbn eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3508ae0595d [] [] }} ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.170 [INFO][2390] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.191 [INFO][2412] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" HandleID="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Workload="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.191 [INFO][2412] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" HandleID="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Workload="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000590120), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.137", "pod":"csi-node-driver-blbbn", "timestamp":"2025-07-12 00:40:19.191774151 +0000 UTC"}, Hostname:"10.0.0.137", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.192 [INFO][2412] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.219 [INFO][2412] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.219 [INFO][2412] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.137' Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.295 [INFO][2412] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.301 [INFO][2412] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.307 [INFO][2412] ipam/ipam.go 511: Trying affinity for 192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.309 [INFO][2412] ipam/ipam.go 158: Attempting to load block cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.311 [INFO][2412] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.311 [INFO][2412] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.10.0/26 handle="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.313 [INFO][2412] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80 Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.316 [INFO][2412] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.10.0/26 handle="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.322 [INFO][2412] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.10.2/26] block=192.168.10.0/26 handle="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.322 [INFO][2412] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.10.2/26] handle="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" host="10.0.0.137" Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.322 [INFO][2412] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:40:19.349854 env[1218]: 2025-07-12 00:40:19.322 [INFO][2412] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.10.2/26] IPv6=[] ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" HandleID="k8s-pod-network.0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Workload="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.350822 env[1218]: 2025-07-12 00:40:19.331 [INFO][2390] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-csi--node--driver--blbbn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"adb47345-25b1-4d84-bdd7-628370ba09cd", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 39, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"", Pod:"csi-node-driver-blbbn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.10.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3508ae0595d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:19.350822 env[1218]: 2025-07-12 00:40:19.331 [INFO][2390] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.10.2/32] ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.350822 env[1218]: 2025-07-12 00:40:19.331 [INFO][2390] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3508ae0595d ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.350822 env[1218]: 2025-07-12 00:40:19.336 [INFO][2390] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.350822 env[1218]: 2025-07-12 00:40:19.337 [INFO][2390] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-csi--node--driver--blbbn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"adb47345-25b1-4d84-bdd7-628370ba09cd", ResourceVersion:"1206", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 39, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80", Pod:"csi-node-driver-blbbn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.10.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3508ae0595d", MAC:"ca:89:d9:df:1c:e3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:19.350822 env[1218]: 2025-07-12 00:40:19.348 [INFO][2390] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80" Namespace="calico-system" Pod="csi-node-driver-blbbn" WorkloadEndpoint="10.0.0.137-k8s-csi--node--driver--blbbn-eth0" Jul 12 00:40:19.358808 env[1218]: time="2025-07-12T00:40:19.358486826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:40:19.358808 env[1218]: time="2025-07-12T00:40:19.358562304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:40:19.358808 env[1218]: time="2025-07-12T00:40:19.358589077Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:40:19.358808 env[1218]: time="2025-07-12T00:40:19.358765725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80 pid=2499 runtime=io.containerd.runc.v2 Jul 12 00:40:19.358000 audit[2504]: NETFILTER_CFG table=filter:80 family=2 entries=42 op=nft_register_chain pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:19.358000 audit[2504]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22552 a0=3 a1=ffffcda3df60 a2=0 a3=ffffa3681fa8 items=0 ppid=2136 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.358000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:19.368519 systemd[1]: Started cri-containerd-0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80.scope. Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit: BPF prog-id=104 op=LOAD Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343766313233636661393839663362616161343863613238663131 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343766313233636661393839663362616161343863613238663131 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit: BPF prog-id=105 op=LOAD Jul 12 00:40:19.395000 audit[2509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343766313233636661393839663362616161343863613238663131 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.395000 audit: BPF prog-id=106 op=LOAD Jul 12 00:40:19.395000 audit[2509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343766313233636661393839663362616161343863613238663131 Jul 12 00:40:19.396000 audit: BPF prog-id=106 op=UNLOAD Jul 12 00:40:19.396000 audit: BPF prog-id=105 op=UNLOAD Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:19.396000 audit: BPF prog-id=107 op=LOAD Jul 12 00:40:19.396000 audit[2509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:19.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343766313233636661393839663362616161343863613238663131 Jul 12 00:40:19.397938 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 12 00:40:19.406312 env[1218]: time="2025-07-12T00:40:19.406272536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-blbbn,Uid:adb47345-25b1-4d84-bdd7-628370ba09cd,Namespace:calico-system,Attempt:1,} returns sandbox id \"0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80\"" Jul 12 00:40:19.768812 kubelet[1463]: E0712 00:40:19.768766 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:20.625253 systemd-networkd[1052]: cali3508ae0595d: Gained IPv6LL Jul 12 00:40:20.769066 kubelet[1463]: E0712 00:40:20.769030 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:21.136868 systemd-networkd[1052]: cali76964fe8571: Gained IPv6LL Jul 12 00:40:21.628463 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount751732574.mount: Deactivated successfully. Jul 12 00:40:21.769847 kubelet[1463]: E0712 00:40:21.769698 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:22.770722 kubelet[1463]: E0712 00:40:22.770680 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:22.786890 env[1218]: time="2025-07-12T00:40:22.786846821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:22.788129 env[1218]: time="2025-07-12T00:40:22.788099110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:22.789834 env[1218]: time="2025-07-12T00:40:22.789805952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:22.791561 env[1218]: time="2025-07-12T00:40:22.791533361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:22.792471 env[1218]: time="2025-07-12T00:40:22.792449469Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 12 00:40:22.794233 env[1218]: time="2025-07-12T00:40:22.794200328Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 12 00:40:22.796480 env[1218]: time="2025-07-12T00:40:22.796445877Z" level=info msg="CreateContainer within sandbox \"49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 12 00:40:22.805883 env[1218]: time="2025-07-12T00:40:22.805829443Z" level=info msg="CreateContainer within sandbox \"49b0a223ac4e466a92592485f9503775dd7d9bcc75196e96c02211356f443e58\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"829b045c96735c60ac28a44a8809838591a0545441248a07cbd7ecc90d75a0b3\"" Jul 12 00:40:22.806243 env[1218]: time="2025-07-12T00:40:22.806218287Z" level=info msg="StartContainer for \"829b045c96735c60ac28a44a8809838591a0545441248a07cbd7ecc90d75a0b3\"" Jul 12 00:40:22.825616 systemd[1]: Started cri-containerd-829b045c96735c60ac28a44a8809838591a0545441248a07cbd7ecc90d75a0b3.scope. Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.849000 audit: BPF prog-id=108 op=LOAD Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2444 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:22.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396230343563393637333563363061633238613434613838303938 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2444 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:22.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396230343563393637333563363061633238613434613838303938 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit: BPF prog-id=109 op=LOAD Jul 12 00:40:22.850000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2444 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:22.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396230343563393637333563363061633238613434613838303938 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit: BPF prog-id=110 op=LOAD Jul 12 00:40:22.850000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2444 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:22.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396230343563393637333563363061633238613434613838303938 Jul 12 00:40:22.850000 audit: BPF prog-id=110 op=UNLOAD Jul 12 00:40:22.850000 audit: BPF prog-id=109 op=UNLOAD Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:22.850000 audit: BPF prog-id=111 op=LOAD Jul 12 00:40:22.850000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2444 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:22.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396230343563393637333563363061633238613434613838303938 Jul 12 00:40:22.865670 env[1218]: time="2025-07-12T00:40:22.865615706Z" level=info msg="StartContainer for \"829b045c96735c60ac28a44a8809838591a0545441248a07cbd7ecc90d75a0b3\" returns successfully" Jul 12 00:40:23.431611 kubelet[1463]: I0712 00:40:23.431559 1463 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 12 00:40:23.530477 kubelet[1463]: I0712 00:40:23.530384 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-x7kpd" podStartSLOduration=16.081224749 podStartE2EDuration="19.530366364s" podCreationTimestamp="2025-07-12 00:40:04 +0000 UTC" firstStartedPulling="2025-07-12 00:40:19.344483951 +0000 UTC m=+27.854879587" lastFinishedPulling="2025-07-12 00:40:22.793625526 +0000 UTC m=+31.304021202" observedRunningTime="2025-07-12 00:40:23.006966816 +0000 UTC m=+31.517362492" watchObservedRunningTime="2025-07-12 00:40:23.530366364 +0000 UTC m=+32.040762040" Jul 12 00:40:23.771119 kubelet[1463]: E0712 00:40:23.771080 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:23.779703 env[1218]: time="2025-07-12T00:40:23.779662015Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:23.781046 env[1218]: time="2025-07-12T00:40:23.781019798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:23.782651 env[1218]: time="2025-07-12T00:40:23.782612395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:23.784181 env[1218]: time="2025-07-12T00:40:23.784156933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:23.784613 env[1218]: time="2025-07-12T00:40:23.784584904Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2\"" Jul 12 00:40:23.788343 env[1218]: time="2025-07-12T00:40:23.788315157Z" level=info msg="CreateContainer within sandbox \"0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 12 00:40:23.798965 env[1218]: time="2025-07-12T00:40:23.798915237Z" level=info msg="CreateContainer within sandbox \"0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6f6cb7e34417bf5e27fdc3a31fbd3e8b14cf340db5dca81f93e1997a0210adcc\"" Jul 12 00:40:23.799408 env[1218]: time="2025-07-12T00:40:23.799384105Z" level=info msg="StartContainer for \"6f6cb7e34417bf5e27fdc3a31fbd3e8b14cf340db5dca81f93e1997a0210adcc\"" Jul 12 00:40:23.821156 systemd[1]: Started cri-containerd-6f6cb7e34417bf5e27fdc3a31fbd3e8b14cf340db5dca81f93e1997a0210adcc.scope. Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2499 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:23.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366362376533343431376266356532376664633361333166626433 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit: BPF prog-id=112 op=LOAD Jul 12 00:40:23.840000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2499 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:23.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366362376533343431376266356532376664633361333166626433 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit: BPF prog-id=113 op=LOAD Jul 12 00:40:23.840000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2499 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:23.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366362376533343431376266356532376664633361333166626433 Jul 12 00:40:23.840000 audit: BPF prog-id=113 op=UNLOAD Jul 12 00:40:23.840000 audit: BPF prog-id=112 op=UNLOAD Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:23.840000 audit: BPF prog-id=114 op=LOAD Jul 12 00:40:23.840000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2499 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:23.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666366362376533343431376266356532376664633361333166626433 Jul 12 00:40:23.853803 env[1218]: time="2025-07-12T00:40:23.853755937Z" level=info msg="StartContainer for \"6f6cb7e34417bf5e27fdc3a31fbd3e8b14cf340db5dca81f93e1997a0210adcc\" returns successfully" Jul 12 00:40:23.855047 env[1218]: time="2025-07-12T00:40:23.855022083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 12 00:40:24.771609 kubelet[1463]: E0712 00:40:24.771544 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:24.953860 env[1218]: time="2025-07-12T00:40:24.953789331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:24.955162 env[1218]: time="2025-07-12T00:40:24.955137282Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:24.956745 env[1218]: time="2025-07-12T00:40:24.956708077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:24.958080 env[1218]: time="2025-07-12T00:40:24.958041503Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:24.958588 env[1218]: time="2025-07-12T00:40:24.958561940Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c\"" Jul 12 00:40:24.962505 env[1218]: time="2025-07-12T00:40:24.962469101Z" level=info msg="CreateContainer within sandbox \"0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 12 00:40:24.973381 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3826844813.mount: Deactivated successfully. Jul 12 00:40:24.976499 env[1218]: time="2025-07-12T00:40:24.976449078Z" level=info msg="CreateContainer within sandbox \"0f47f123cfa989f3baaa48ca28f1189a3d5c70d1cc1c16937ce54eecbc375a80\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3e05a57b77b4711efac836bb520fdab40343a3da6d5fdd0ee0c665d6d0ee25a2\"" Jul 12 00:40:24.977221 env[1218]: time="2025-07-12T00:40:24.977169951Z" level=info msg="StartContainer for \"3e05a57b77b4711efac836bb520fdab40343a3da6d5fdd0ee0c665d6d0ee25a2\"" Jul 12 00:40:24.997196 systemd[1]: Started cri-containerd-3e05a57b77b4711efac836bb520fdab40343a3da6d5fdd0ee0c665d6d0ee25a2.scope. Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045823 kernel: kauditd_printk_skb: 210 callbacks suppressed Jul 12 00:40:25.045893 kernel: audit: type=1400 audit(1752280825.044:720): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2499 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:25.051968 kernel: audit: type=1300 audit(1752280825.044:720): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2499 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:25.052022 kernel: audit: type=1327 audit(1752280825.044:720): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303561353762373762343731316566616338333662623532306664 Jul 12 00:40:25.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303561353762373762343731316566616338333662623532306664 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.057759 kernel: audit: type=1400 audit(1752280825.044:721): avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.057799 kernel: audit: type=1400 audit(1752280825.044:721): avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.062373 kernel: audit: type=1400 audit(1752280825.044:721): avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.062451 kernel: audit: type=1400 audit(1752280825.044:721): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.067049 kernel: audit: type=1400 audit(1752280825.044:721): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.067108 kernel: audit: type=1400 audit(1752280825.044:721): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.071703 kernel: audit: type=1400 audit(1752280825.044:721): avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.044000 audit: BPF prog-id=115 op=LOAD Jul 12 00:40:25.044000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2499 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:25.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303561353762373762343731316566616338333662623532306664 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.045000 audit: BPF prog-id=116 op=LOAD Jul 12 00:40:25.045000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2499 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:25.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303561353762373762343731316566616338333662623532306664 Jul 12 00:40:25.047000 audit: BPF prog-id=116 op=UNLOAD Jul 12 00:40:25.047000 audit: BPF prog-id=115 op=UNLOAD Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:25.047000 audit: BPF prog-id=117 op=LOAD Jul 12 00:40:25.047000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2499 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303561353762373762343731316566616338333662623532306664 Jul 12 00:40:25.079798 env[1218]: time="2025-07-12T00:40:25.079756102Z" level=info msg="StartContainer for \"3e05a57b77b4711efac836bb520fdab40343a3da6d5fdd0ee0c665d6d0ee25a2\" returns successfully" Jul 12 00:40:25.772583 kubelet[1463]: E0712 00:40:25.772538 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:25.905620 kubelet[1463]: I0712 00:40:25.905592 1463 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 12 00:40:25.905620 kubelet[1463]: I0712 00:40:25.905624 1463 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 12 00:40:26.017061 kubelet[1463]: I0712 00:40:26.017001 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-blbbn" podStartSLOduration=27.465037898 podStartE2EDuration="33.016985042s" podCreationTimestamp="2025-07-12 00:39:53 +0000 UTC" firstStartedPulling="2025-07-12 00:40:19.407356357 +0000 UTC m=+27.917752033" lastFinishedPulling="2025-07-12 00:40:24.959303501 +0000 UTC m=+33.469699177" observedRunningTime="2025-07-12 00:40:26.016710268 +0000 UTC m=+34.527105944" watchObservedRunningTime="2025-07-12 00:40:26.016985042 +0000 UTC m=+34.527380718" Jul 12 00:40:26.522000 audit[2721]: NETFILTER_CFG table=filter:81 family=2 entries=24 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:26.522000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=fffff356fe70 a2=0 a3=1 items=0 ppid=1621 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:26.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:26.530000 audit[2721]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:26.530000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff356fe70 a2=0 a3=1 items=0 ppid=1621 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:26.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:26.546000 audit[2723]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:26.546000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffc4e109a0 a2=0 a3=1 items=0 ppid=1621 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:26.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:26.560000 audit[2723]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:26.560000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc4e109a0 a2=0 a3=1 items=0 ppid=1621 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:26.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:26.572514 systemd[1]: Created slice kubepods-besteffort-podcde51602_9fe5_4819_8159_f70d7d04dc20.slice. Jul 12 00:40:26.588313 kubelet[1463]: I0712 00:40:26.588260 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bmrj8\" (UniqueName: \"kubernetes.io/projected/cde51602-9fe5-4819-8159-f70d7d04dc20-kube-api-access-bmrj8\") pod \"nfs-server-provisioner-0\" (UID: \"cde51602-9fe5-4819-8159-f70d7d04dc20\") " pod="default/nfs-server-provisioner-0" Jul 12 00:40:26.588471 kubelet[1463]: I0712 00:40:26.588338 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/cde51602-9fe5-4819-8159-f70d7d04dc20-data\") pod \"nfs-server-provisioner-0\" (UID: \"cde51602-9fe5-4819-8159-f70d7d04dc20\") " pod="default/nfs-server-provisioner-0" Jul 12 00:40:26.772789 kubelet[1463]: E0712 00:40:26.772744 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:26.875404 env[1218]: time="2025-07-12T00:40:26.875285782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:cde51602-9fe5-4819-8159-f70d7d04dc20,Namespace:default,Attempt:0,}" Jul 12 00:40:26.981033 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 12 00:40:26.981124 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 12 00:40:26.980655 systemd-networkd[1052]: cali60e51b789ff: Link UP Jul 12 00:40:26.981126 systemd-networkd[1052]: cali60e51b789ff: Gained carrier Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.917 [INFO][2726] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.137-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default cde51602-9fe5-4819-8159-f70d7d04dc20 1277 0 2025-07-12 00:40:26 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.137 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.917 [INFO][2726] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.939 [INFO][2740] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" HandleID="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Workload="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.940 [INFO][2740] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" HandleID="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Workload="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c3200), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.137", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-12 00:40:26.939968813 +0000 UTC"}, Hostname:"10.0.0.137", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.940 [INFO][2740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.940 [INFO][2740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.940 [INFO][2740] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.137' Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.950 [INFO][2740] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.956 [INFO][2740] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.961 [INFO][2740] ipam/ipam.go 511: Trying affinity for 192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.963 [INFO][2740] ipam/ipam.go 158: Attempting to load block cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.965 [INFO][2740] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.965 [INFO][2740] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.10.0/26 handle="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.967 [INFO][2740] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.970 [INFO][2740] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.10.0/26 handle="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.976 [INFO][2740] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.10.3/26] block=192.168.10.0/26 handle="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.976 [INFO][2740] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.10.3/26] handle="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" host="10.0.0.137" Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.976 [INFO][2740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:40:26.993985 env[1218]: 2025-07-12 00:40:26.976 [INFO][2740] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.10.3/26] IPv6=[] ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" HandleID="k8s-pod-network.11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Workload="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" Jul 12 00:40:26.994712 env[1218]: 2025-07-12 00:40:26.977 [INFO][2726] cni-plugin/k8s.go 418: Populated endpoint ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"cde51602-9fe5-4819-8159-f70d7d04dc20", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 40, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.10.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:26.994712 env[1218]: 2025-07-12 00:40:26.978 [INFO][2726] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.10.3/32] ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" Jul 12 00:40:26.994712 env[1218]: 2025-07-12 00:40:26.978 [INFO][2726] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" Jul 12 00:40:26.994712 env[1218]: 2025-07-12 00:40:26.981 [INFO][2726] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" Jul 12 00:40:26.995179 env[1218]: 2025-07-12 00:40:26.983 [INFO][2726] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"cde51602-9fe5-4819-8159-f70d7d04dc20", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 40, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.10.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"12:89:5f:89:80:79", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:26.995179 env[1218]: 2025-07-12 00:40:26.992 [INFO][2726] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.137-k8s-nfs--server--provisioner--0-eth0" Jul 12 00:40:27.003000 audit[2765]: NETFILTER_CFG table=filter:85 family=2 entries=40 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:27.003000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffe35875a0 a2=0 a3=ffff9e3dcfa8 items=0 ppid=2136 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:27.003000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:27.005095 env[1218]: time="2025-07-12T00:40:27.005034980Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:40:27.005095 env[1218]: time="2025-07-12T00:40:27.005077433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:40:27.005181 env[1218]: time="2025-07-12T00:40:27.005094839Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:40:27.005835 env[1218]: time="2025-07-12T00:40:27.005264654Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd pid=2766 runtime=io.containerd.runc.v2 Jul 12 00:40:27.021594 systemd[1]: Started cri-containerd-11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd.scope. Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.043000 audit: BPF prog-id=118 op=LOAD Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:27.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636438633966336566336534303434336566613466303133613237 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:27.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636438633966336566336534303434336566613466303133613237 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit: BPF prog-id=119 op=LOAD Jul 12 00:40:27.044000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:27.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636438633966336566336534303434336566613466303133613237 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit: BPF prog-id=120 op=LOAD Jul 12 00:40:27.044000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:27.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636438633966336566336534303434336566613466303133613237 Jul 12 00:40:27.044000 audit: BPF prog-id=120 op=UNLOAD Jul 12 00:40:27.044000 audit: BPF prog-id=119 op=UNLOAD Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:27.044000 audit: BPF prog-id=121 op=LOAD Jul 12 00:40:27.044000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:27.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636438633966336566336534303434336566613466303133613237 Jul 12 00:40:27.046716 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 12 00:40:27.061937 env[1218]: time="2025-07-12T00:40:27.061888755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:cde51602-9fe5-4819-8159-f70d7d04dc20,Namespace:default,Attempt:0,} returns sandbox id \"11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd\"" Jul 12 00:40:27.063226 env[1218]: time="2025-07-12T00:40:27.063198819Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 12 00:40:27.773830 kubelet[1463]: E0712 00:40:27.773785 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:28.774385 kubelet[1463]: E0712 00:40:28.774334 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:28.816905 systemd-networkd[1052]: cali60e51b789ff: Gained IPv6LL Jul 12 00:40:28.988520 update_engine[1209]: I0712 00:40:28.988461 1209 update_attempter.cc:509] Updating boot flags... Jul 12 00:40:29.265768 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2479750543.mount: Deactivated successfully. Jul 12 00:40:29.775531 kubelet[1463]: E0712 00:40:29.775486 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:30.775894 kubelet[1463]: E0712 00:40:30.775827 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:31.122026 env[1218]: time="2025-07-12T00:40:31.121915458Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:31.124320 env[1218]: time="2025-07-12T00:40:31.124275401Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:31.126458 env[1218]: time="2025-07-12T00:40:31.126420887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:31.128203 env[1218]: time="2025-07-12T00:40:31.128158265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:31.128841 env[1218]: time="2025-07-12T00:40:31.128810477Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Jul 12 00:40:31.132972 env[1218]: time="2025-07-12T00:40:31.132939047Z" level=info msg="CreateContainer within sandbox \"11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 12 00:40:31.143104 env[1218]: time="2025-07-12T00:40:31.143071320Z" level=info msg="CreateContainer within sandbox \"11cd8c9f3ef3e40443efa4f013a27fda1cdfdabe3870c2129b7c804d3b8696fd\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"dc8754a9433546b3436695f14e2579ead94f99c3ab0850e10d3a980074bedede\"" Jul 12 00:40:31.143646 env[1218]: time="2025-07-12T00:40:31.143559489Z" level=info msg="StartContainer for \"dc8754a9433546b3436695f14e2579ead94f99c3ab0850e10d3a980074bedede\"" Jul 12 00:40:31.159892 systemd[1]: Started cri-containerd-dc8754a9433546b3436695f14e2579ead94f99c3ab0850e10d3a980074bedede.scope. Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210254 kernel: kauditd_printk_skb: 105 callbacks suppressed Jul 12 00:40:31.210306 kernel: audit: type=1400 audit(1752280831.208:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214882 kernel: audit: type=1400 audit(1752280831.208:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214933 kernel: audit: type=1400 audit(1752280831.208:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.220074 kernel: audit: type=1400 audit(1752280831.208:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.223061 kernel: audit: type=1400 audit(1752280831.208:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.225916 kernel: audit: type=1400 audit(1752280831.208:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.233294 kernel: audit: type=1400 audit(1752280831.208:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.233347 kernel: audit: type=1400 audit(1752280831.208:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.233369 kernel: audit: type=1400 audit(1752280831.208:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.235762 kernel: audit: type=1400 audit(1752280831.209:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.209000 audit: BPF prog-id=122 op=LOAD Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2766 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:31.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383735346139343333353436623334333636393566313465323537 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2766 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:31.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383735346139343333353436623334333636393566313465323537 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.210000 audit: BPF prog-id=123 op=LOAD Jul 12 00:40:31.210000 audit[2827]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2766 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:31.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383735346139343333353436623334333636393566313465323537 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.211000 audit: BPF prog-id=124 op=LOAD Jul 12 00:40:31.211000 audit[2827]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2766 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:31.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383735346139343333353436623334333636393566313465323537 Jul 12 00:40:31.214000 audit: BPF prog-id=124 op=UNLOAD Jul 12 00:40:31.214000 audit: BPF prog-id=123 op=UNLOAD Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:31.214000 audit: BPF prog-id=125 op=LOAD Jul 12 00:40:31.214000 audit[2827]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2766 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:31.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383735346139343333353436623334333636393566313465323537 Jul 12 00:40:31.258887 env[1218]: time="2025-07-12T00:40:31.258137159Z" level=info msg="StartContainer for \"dc8754a9433546b3436695f14e2579ead94f99c3ab0850e10d3a980074bedede\" returns successfully" Jul 12 00:40:31.338000 audit[2854]: AVC avc: denied { search } for pid=2854 comm="rpcbind" name="crypto" dev="proc" ino=15312 scontext=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 12 00:40:31.338000 audit[2854]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9867f000 a2=0 a3=0 items=0 ppid=2837 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 key=(null) Jul 12 00:40:31.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 12 00:40:31.394000 audit[2859]: AVC avc: denied { search } for pid=2859 comm="dbus-daemon" name="crypto" dev="proc" ino=15312 scontext=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 12 00:40:31.394000 audit[2859]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff99e4f000 a2=0 a3=0 items=0 ppid=2837 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 key=(null) Jul 12 00:40:31.394000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 12 00:40:31.407000 audit[2860]: AVC avc: denied { watch } for pid=2860 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537626 scontext=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c439,c478 tclass=dir permissive=0 Jul 12 00:40:31.407000 audit[2860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf75d9320 a2=2c8 a3=aaaaf75b1a60 items=0 ppid=2837 pid=2860 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 key=(null) Jul 12 00:40:31.407000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 12 00:40:31.414000 audit[2861]: AVC avc: denied { read } for pid=2861 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=15334 scontext=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 12 00:40:31.414000 audit[2861]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff9126a570 a2=80000 a3=0 items=0 ppid=2837 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 key=(null) Jul 12 00:40:31.414000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 12 00:40:31.416000 audit[2861]: AVC avc: denied { search } for pid=2861 comm="ganesha.nfsd" name="crypto" dev="proc" ino=15312 scontext=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 12 00:40:31.416000 audit[2861]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff905ff000 a2=0 a3=0 items=0 ppid=2837 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c439,c478 key=(null) Jul 12 00:40:31.416000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 12 00:40:31.776984 kubelet[1463]: E0712 00:40:31.776943 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:32.036450 kubelet[1463]: I0712 00:40:32.036322 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.969432241 podStartE2EDuration="6.036308489s" podCreationTimestamp="2025-07-12 00:40:26 +0000 UTC" firstStartedPulling="2025-07-12 00:40:27.062932973 +0000 UTC m=+35.573328649" lastFinishedPulling="2025-07-12 00:40:31.129809221 +0000 UTC m=+39.640204897" observedRunningTime="2025-07-12 00:40:32.035429988 +0000 UTC m=+40.545825664" watchObservedRunningTime="2025-07-12 00:40:32.036308489 +0000 UTC m=+40.546704165" Jul 12 00:40:32.044000 audit[2881]: NETFILTER_CFG table=filter:86 family=2 entries=24 op=nft_register_rule pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:32.044000 audit[2881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcf3bd1d0 a2=0 a3=1 items=0 ppid=1621 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:32.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:32.056000 audit[2881]: NETFILTER_CFG table=nat:87 family=2 entries=106 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:32.056000 audit[2881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffcf3bd1d0 a2=0 a3=1 items=0 ppid=1621 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:32.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:32.567000 audit[2883]: NETFILTER_CFG table=filter:88 family=2 entries=11 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:32.567000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff4107670 a2=0 a3=1 items=0 ppid=1621 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:32.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:32.582000 audit[2883]: NETFILTER_CFG table=nat:89 family=2 entries=53 op=nft_register_chain pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:32.582000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19332 a0=3 a1=fffff4107670 a2=0 a3=1 items=0 ppid=1621 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:32.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:32.753259 kubelet[1463]: E0712 00:40:32.753200 1463 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:32.777712 kubelet[1463]: E0712 00:40:32.777652 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:33.350000 audit[2886]: NETFILTER_CFG table=filter:90 family=2 entries=10 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:33.350000 audit[2886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe8d1dd30 a2=0 a3=1 items=0 ppid=1621 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:33.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:33.363000 audit[2886]: NETFILTER_CFG table=nat:91 family=2 entries=60 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:33.363000 audit[2886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21220 a0=3 a1=ffffe8d1dd30 a2=0 a3=1 items=0 ppid=1621 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:33.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:33.777826 kubelet[1463]: E0712 00:40:33.777781 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:34.778585 kubelet[1463]: E0712 00:40:34.778532 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:35.779658 kubelet[1463]: E0712 00:40:35.779599 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:36.570832 systemd[1]: Created slice kubepods-besteffort-podad539216_1a4a_4dea_9fa3_2df517880c79.slice. Jul 12 00:40:36.650404 kubelet[1463]: I0712 00:40:36.650350 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-2e717e9e-1dd3-494f-a51f-03ae3e73e538\" (UniqueName: \"kubernetes.io/nfs/ad539216-1a4a-4dea-9fa3-2df517880c79-pvc-2e717e9e-1dd3-494f-a51f-03ae3e73e538\") pod \"test-pod-1\" (UID: \"ad539216-1a4a-4dea-9fa3-2df517880c79\") " pod="default/test-pod-1" Jul 12 00:40:36.650404 kubelet[1463]: I0712 00:40:36.650391 1463 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b7xqn\" (UniqueName: \"kubernetes.io/projected/ad539216-1a4a-4dea-9fa3-2df517880c79-kube-api-access-b7xqn\") pod \"test-pod-1\" (UID: \"ad539216-1a4a-4dea-9fa3-2df517880c79\") " pod="default/test-pod-1" Jul 12 00:40:36.771944 kernel: kauditd_printk_skb: 80 callbacks suppressed Jul 12 00:40:36.772096 kernel: audit: type=1400 audit(1752280836.769:778): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.772125 kernel: Failed to create system directory netfs Jul 12 00:40:36.769000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.769000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.775756 kernel: Failed to create system directory netfs Jul 12 00:40:36.775800 kernel: audit: type=1400 audit(1752280836.769:778): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.775820 kernel: Failed to create system directory netfs Jul 12 00:40:36.769000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.778893 kernel: audit: type=1400 audit(1752280836.769:778): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.780089 kubelet[1463]: E0712 00:40:36.780062 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:36.781462 kernel: Failed to create system directory netfs Jul 12 00:40:36.781513 kernel: audit: type=1400 audit(1752280836.769:778): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.769000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.769000 audit[2893]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab015c55e0 a1=12c14 a2=aaaadd02e028 a3=aaab015b6010 items=0 ppid=1083 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:36.788290 kernel: audit: type=1300 audit(1752280836.769:778): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab015c55e0 a1=12c14 a2=aaaadd02e028 a3=aaab015b6010 items=0 ppid=1083 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:36.788374 kernel: audit: type=1327 audit(1752280836.769:778): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 12 00:40:36.769000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.798110 kernel: Failed to create system directory fscache Jul 12 00:40:36.798186 kernel: audit: type=1400 audit(1752280836.791:779): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.798209 kernel: Failed to create system directory fscache Jul 12 00:40:36.798224 kernel: audit: type=1400 audit(1752280836.791:779): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.801448 kernel: Failed to create system directory fscache Jul 12 00:40:36.801532 kernel: audit: type=1400 audit(1752280836.791:779): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.807965 kernel: Failed to create system directory fscache Jul 12 00:40:36.808049 kernel: audit: type=1400 audit(1752280836.791:779): avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.808071 kernel: Failed to create system directory fscache Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.808765 kernel: Failed to create system directory fscache Jul 12 00:40:36.810897 kernel: Failed to create system directory fscache Jul 12 00:40:36.810941 kernel: Failed to create system directory fscache Jul 12 00:40:36.810959 kernel: Failed to create system directory fscache Jul 12 00:40:36.810975 kernel: Failed to create system directory fscache Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.812084 kernel: Failed to create system directory fscache Jul 12 00:40:36.812124 kernel: Failed to create system directory fscache Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.813210 kernel: Failed to create system directory fscache Jul 12 00:40:36.813234 kernel: Failed to create system directory fscache Jul 12 00:40:36.791000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.815917 kernel: FS-Cache: Loaded Jul 12 00:40:36.791000 audit[2893]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab017d8210 a1=4c344 a2=aaaadd02e028 a3=aaab015b6010 items=0 ppid=1083 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:36.791000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.842782 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.842825 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.842842 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.843897 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.843927 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.844983 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.845007 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.846073 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.847147 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.847171 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.847187 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.849069 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.849093 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.850755 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.851995 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.852029 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.853923 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.853950 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.855685 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.855708 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.856811 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.856829 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.857918 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.857938 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.858992 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.860090 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.860109 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.860127 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.861184 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.861208 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.862801 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.862818 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.862837 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.863889 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.863907 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.864969 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.864989 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.866058 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.866092 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.867165 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.867186 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.868259 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.868286 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.869865 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.869893 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.869913 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.870951 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.870968 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.872018 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.873117 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.873139 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.873154 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.874205 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.874222 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.875836 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.875859 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.875876 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.876923 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.876944 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.877989 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.878011 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.879081 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.879102 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.880198 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.880214 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.880761 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.881808 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.882901 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.882924 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.882940 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.883965 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.883982 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.885144 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.885909 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.885937 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.887076 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.887100 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.888374 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.888400 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.890024 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.890050 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.890065 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.891106 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.891124 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.892199 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.892216 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.893972 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.893991 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.894005 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.895062 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.895082 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.896333 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.896351 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.897770 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.898923 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.898950 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.898971 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.900005 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.900030 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.901101 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.901118 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.902193 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.902214 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.903822 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.903841 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.903863 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.904916 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.904946 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.905997 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.906023 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.907088 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.908179 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.908194 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.908208 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.909284 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.909301 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.910923 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.910952 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.910968 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.912014 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.912035 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.913103 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.914199 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.914215 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.914233 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.834000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.915752 kernel: Failed to create system directory sunrpc Jul 12 00:40:36.923193 kernel: RPC: Registered named UNIX socket transport module. Jul 12 00:40:36.923243 kernel: RPC: Registered udp transport module. Jul 12 00:40:36.923263 kernel: RPC: Registered tcp transport module. Jul 12 00:40:36.923278 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 12 00:40:36.834000 audit[2893]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab01824560 a1=14a74c a2=aaaadd02e028 a3=aaab015b6010 items=6 ppid=1083 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:36.834000 audit: CWD cwd="/" Jul 12 00:40:36.834000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:36.834000 audit: PATH item=1 name=(null) inode=17939 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:36.834000 audit: PATH item=2 name=(null) inode=17939 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:36.834000 audit: PATH item=3 name=(null) inode=17940 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:36.834000 audit: PATH item=4 name=(null) inode=17939 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:36.834000 audit: PATH item=5 name=(null) inode=17941 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:40:36.834000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.950073 kernel: Failed to create system directory nfs Jul 12 00:40:36.950110 kernel: Failed to create system directory nfs Jul 12 00:40:36.950128 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.951156 kernel: Failed to create system directory nfs Jul 12 00:40:36.951176 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.952225 kernel: Failed to create system directory nfs Jul 12 00:40:36.952254 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.953784 kernel: Failed to create system directory nfs Jul 12 00:40:36.953801 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.954833 kernel: Failed to create system directory nfs Jul 12 00:40:36.954853 kernel: Failed to create system directory nfs Jul 12 00:40:36.954867 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.955843 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.956870 kernel: Failed to create system directory nfs Jul 12 00:40:36.956886 kernel: Failed to create system directory nfs Jul 12 00:40:36.956910 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.957924 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.958969 kernel: Failed to create system directory nfs Jul 12 00:40:36.958992 kernel: Failed to create system directory nfs Jul 12 00:40:36.959006 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.960022 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.961048 kernel: Failed to create system directory nfs Jul 12 00:40:36.961069 kernel: Failed to create system directory nfs Jul 12 00:40:36.961083 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.962080 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.963126 kernel: Failed to create system directory nfs Jul 12 00:40:36.963141 kernel: Failed to create system directory nfs Jul 12 00:40:36.963162 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.964161 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.965215 kernel: Failed to create system directory nfs Jul 12 00:40:36.965230 kernel: Failed to create system directory nfs Jul 12 00:40:36.965243 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.966780 kernel: Failed to create system directory nfs Jul 12 00:40:36.966796 kernel: Failed to create system directory nfs Jul 12 00:40:36.966814 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.967827 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.968896 kernel: Failed to create system directory nfs Jul 12 00:40:36.968916 kernel: Failed to create system directory nfs Jul 12 00:40:36.968929 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.970020 kernel: Failed to create system directory nfs Jul 12 00:40:36.970043 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.971161 kernel: Failed to create system directory nfs Jul 12 00:40:36.971186 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.972214 kernel: Failed to create system directory nfs Jul 12 00:40:36.972232 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.973786 kernel: Failed to create system directory nfs Jul 12 00:40:36.973804 kernel: Failed to create system directory nfs Jul 12 00:40:36.973816 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.974825 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.975876 kernel: Failed to create system directory nfs Jul 12 00:40:36.975896 kernel: Failed to create system directory nfs Jul 12 00:40:36.975914 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.976930 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.977966 kernel: Failed to create system directory nfs Jul 12 00:40:36.977983 kernel: Failed to create system directory nfs Jul 12 00:40:36.977996 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.978991 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.980014 kernel: Failed to create system directory nfs Jul 12 00:40:36.980035 kernel: Failed to create system directory nfs Jul 12 00:40:36.980049 kernel: Failed to create system directory nfs Jul 12 00:40:36.944000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:36.998754 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 12 00:40:36.944000 audit[2893]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab019cda40 a1=116364 a2=aaaadd02e028 a3=aaab015b6010 items=0 ppid=1083 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:36.944000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.026868 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.026905 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.028077 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.028102 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.029189 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.029213 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.029229 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.030805 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.030837 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.031897 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.031914 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.032970 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.032999 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.033014 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.034975 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.035010 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.036089 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.036114 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.036139 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.037175 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.037210 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.038254 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.038792 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.038822 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.039856 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.039895 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.040922 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.041993 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.042028 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.042048 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.043092 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.044199 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.044238 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.044258 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.045825 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.045851 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.045869 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.046909 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.048013 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.048044 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.048067 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.049110 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.050223 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.050257 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.050273 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.051875 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.051900 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.051914 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.052988 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.054069 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.054095 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.054109 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.055168 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.055196 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.056253 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.056791 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.057885 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.057903 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.057917 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.058971 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.060050 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.060066 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.060079 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.061117 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.062198 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.062214 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.062232 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.063806 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.063821 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.064897 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.064919 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.064953 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.065988 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.066022 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.067075 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.068166 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.068199 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.068218 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.069263 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.069284 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.070863 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.070882 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.070898 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.071953 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.073054 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.073080 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.073096 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.074147 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.075243 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.075276 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.075292 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.076876 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.076909 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.076924 kernel: Failed to create system directory nfs4 Jul 12 00:40:37.017000 audit[2898]: AVC avc: denied { confidentiality } for pid=2898 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.178918 kernel: NFS: Registering the id_resolver key type Jul 12 00:40:37.179030 kernel: Key type id_resolver registered Jul 12 00:40:37.179052 kernel: Key type id_legacy registered Jul 12 00:40:37.017000 audit[2898]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb262a010 a1=19c79c a2=aaaad782e028 a3=aaaad93ef010 items=0 ppid=1083 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.017000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.191194 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.191228 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.191903 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.193167 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.193194 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.193824 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.195095 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.195121 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.195746 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.196996 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.197018 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.197044 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.198167 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.198766 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.199910 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.199941 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.199962 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.201069 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.202264 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.202283 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.202303 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.204030 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.204058 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.204074 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.205224 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: AVC avc: denied { confidentiality } for pid=2901 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:40:37.205835 kernel: Failed to create system directory rpcgss Jul 12 00:40:37.186000 audit[2901]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8f9b2010 a1=5ee94 a2=aaaacad8e028 a3=aaaaed57c010 items=0 ppid=1083 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.186000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 12 00:40:37.224534 nfsidmap[2909]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 12 00:40:37.227368 nfsidmap[2912]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 12 00:40:37.241000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 12 00:40:37.241000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 12 00:40:37.241000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 12 00:40:37.241000 audit[1289]: AVC avc: denied { watch_reads } for pid=1289 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 12 00:40:37.241000 audit[1289]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd895520 a2=10 a3=0 items=0 ppid=1 pid=1289 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.241000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 12 00:40:37.241000 audit[1289]: AVC avc: denied { watch_reads } for pid=1289 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 12 00:40:37.241000 audit[1289]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd895520 a2=10 a3=0 items=0 ppid=1 pid=1289 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.241000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 12 00:40:37.241000 audit[1289]: AVC avc: denied { watch_reads } for pid=1289 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2549 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 12 00:40:37.241000 audit[1289]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd895520 a2=10 a3=0 items=0 ppid=1 pid=1289 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.241000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 12 00:40:37.474134 env[1218]: time="2025-07-12T00:40:37.473708826Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ad539216-1a4a-4dea-9fa3-2df517880c79,Namespace:default,Attempt:0,}" Jul 12 00:40:37.592824 systemd-networkd[1052]: cali5ec59c6bf6e: Link UP Jul 12 00:40:37.594388 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 12 00:40:37.595163 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 12 00:40:37.594615 systemd-networkd[1052]: cali5ec59c6bf6e: Gained carrier Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.521 [INFO][2915] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.137-k8s-test--pod--1-eth0 default ad539216-1a4a-4dea-9fa3-2df517880c79 1353 0 2025-07-12 00:40:27 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.137 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.522 [INFO][2915] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-eth0" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.542 [INFO][2931] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" HandleID="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Workload="10.0.0.137-k8s-test--pod--1-eth0" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.542 [INFO][2931] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" HandleID="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Workload="10.0.0.137-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c790), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.137", "pod":"test-pod-1", "timestamp":"2025-07-12 00:40:37.542652033 +0000 UTC"}, Hostname:"10.0.0.137", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.542 [INFO][2931] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.542 [INFO][2931] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.542 [INFO][2931] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.137' Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.557 [INFO][2931] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.562 [INFO][2931] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.566 [INFO][2931] ipam/ipam.go 511: Trying affinity for 192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.571 [INFO][2931] ipam/ipam.go 158: Attempting to load block cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.573 [INFO][2931] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.10.0/26 host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.573 [INFO][2931] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.10.0/26 handle="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.577 [INFO][2931] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.582 [INFO][2931] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.10.0/26 handle="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.589 [INFO][2931] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.10.4/26] block=192.168.10.0/26 handle="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.589 [INFO][2931] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.10.4/26] handle="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" host="10.0.0.137" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.589 [INFO][2931] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.589 [INFO][2931] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.10.4/26] IPv6=[] ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" HandleID="k8s-pod-network.02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Workload="10.0.0.137-k8s-test--pod--1-eth0" Jul 12 00:40:37.605804 env[1218]: 2025-07-12 00:40:37.590 [INFO][2915] cni-plugin/k8s.go 418: Populated endpoint ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ad539216-1a4a-4dea-9fa3-2df517880c79", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 40, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:37.606418 env[1218]: 2025-07-12 00:40:37.591 [INFO][2915] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.10.4/32] ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-eth0" Jul 12 00:40:37.606418 env[1218]: 2025-07-12 00:40:37.591 [INFO][2915] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-eth0" Jul 12 00:40:37.606418 env[1218]: 2025-07-12 00:40:37.594 [INFO][2915] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-eth0" Jul 12 00:40:37.606418 env[1218]: 2025-07-12 00:40:37.595 [INFO][2915] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.137-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ad539216-1a4a-4dea-9fa3-2df517880c79", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 40, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.137", ContainerID:"02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ca:3f:be:fc:72:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:40:37.606418 env[1218]: 2025-07-12 00:40:37.603 [INFO][2915] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.137-k8s-test--pod--1-eth0" Jul 12 00:40:37.613000 audit[2956]: NETFILTER_CFG table=filter:92 family=2 entries=40 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:40:37.613000 audit[2956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffeac51510 a2=0 a3=ffff9943ffa8 items=0 ppid=2136 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.613000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:40:37.615803 env[1218]: time="2025-07-12T00:40:37.615559951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:40:37.615803 env[1218]: time="2025-07-12T00:40:37.615596758Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:40:37.615803 env[1218]: time="2025-07-12T00:40:37.615607040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:40:37.615803 env[1218]: time="2025-07-12T00:40:37.615722023Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f pid=2957 runtime=io.containerd.runc.v2 Jul 12 00:40:37.626612 systemd[1]: Started cri-containerd-02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f.scope. Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.674000 audit: BPF prog-id=126 op=LOAD Jul 12 00:40:37.675000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.675000 audit[2984]: NETFILTER_CFG table=filter:93 family=2 entries=9 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:37.675000 audit[2984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffd066170 a2=0 a3=1 items=0 ppid=1621 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:37.675000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2957 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646435656238663666316432386361393562623965333537326539 Jul 12 00:40:37.675000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.675000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2957 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646435656238663666316432386361393562623965333537326539 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit: BPF prog-id=127 op=LOAD Jul 12 00:40:37.676000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2957 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646435656238663666316432386361393562623965333537326539 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.676000 audit: BPF prog-id=128 op=LOAD Jul 12 00:40:37.676000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2957 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646435656238663666316432386361393562623965333537326539 Jul 12 00:40:37.677000 audit: BPF prog-id=128 op=UNLOAD Jul 12 00:40:37.677000 audit: BPF prog-id=127 op=UNLOAD Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { perfmon } for pid=2966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit[2966]: AVC avc: denied { bpf } for pid=2966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:37.677000 audit: BPF prog-id=129 op=LOAD Jul 12 00:40:37.677000 audit[2966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2957 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032646435656238663666316432386361393562623965333537326539 Jul 12 00:40:37.680346 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 12 00:40:37.682000 audit[2984]: NETFILTER_CFG table=nat:94 family=2 entries=55 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:40:37.682000 audit[2984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20100 a0=3 a1=fffffd066170 a2=0 a3=1 items=0 ppid=1621 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:37.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:40:37.700599 env[1218]: time="2025-07-12T00:40:37.700561956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ad539216-1a4a-4dea-9fa3-2df517880c79,Namespace:default,Attempt:0,} returns sandbox id \"02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f\"" Jul 12 00:40:37.702280 env[1218]: time="2025-07-12T00:40:37.702252573Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 12 00:40:37.781579 kubelet[1463]: E0712 00:40:37.781467 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:37.947017 env[1218]: time="2025-07-12T00:40:37.946974581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:37.948406 env[1218]: time="2025-07-12T00:40:37.948369579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:37.950032 env[1218]: time="2025-07-12T00:40:37.949975858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:37.951459 env[1218]: time="2025-07-12T00:40:37.951433429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:40:37.952388 env[1218]: time="2025-07-12T00:40:37.952345250Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:cd8b38a4e22587134e82fff3512a99b84799274d989a1ec20f58c7f8c89b8511\"" Jul 12 00:40:37.956049 env[1218]: time="2025-07-12T00:40:37.956017541Z" level=info msg="CreateContainer within sandbox \"02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 12 00:40:37.966639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2617219164.mount: Deactivated successfully. Jul 12 00:40:37.967357 env[1218]: time="2025-07-12T00:40:37.967322833Z" level=info msg="CreateContainer within sandbox \"02dd5eb8f6f1d28ca95bb9e3572e98855cf1b8b5af6cab843bc7cec8bb9cf88f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"a488770250da172b3c7d170fc58460ec1231c48111ae7636950e61d031a1fa6e\"" Jul 12 00:40:37.968041 env[1218]: time="2025-07-12T00:40:37.968016611Z" level=info msg="StartContainer for \"a488770250da172b3c7d170fc58460ec1231c48111ae7636950e61d031a1fa6e\"" Jul 12 00:40:37.986655 systemd[1]: Started cri-containerd-a488770250da172b3c7d170fc58460ec1231c48111ae7636950e61d031a1fa6e.scope. Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.015000 audit: BPF prog-id=130 op=LOAD Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2957 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383837373032353064613137326233633764313730666335383436 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2957 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383837373032353064613137326233633764313730666335383436 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit: BPF prog-id=131 op=LOAD Jul 12 00:40:38.016000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2957 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383837373032353064613137326233633764313730666335383436 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit: BPF prog-id=132 op=LOAD Jul 12 00:40:38.016000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2957 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383837373032353064613137326233633764313730666335383436 Jul 12 00:40:38.016000 audit: BPF prog-id=132 op=UNLOAD Jul 12 00:40:38.016000 audit: BPF prog-id=131 op=UNLOAD Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:40:38.016000 audit: BPF prog-id=133 op=LOAD Jul 12 00:40:38.016000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2957 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:40:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134383837373032353064613137326233633764313730666335383436 Jul 12 00:40:38.031847 env[1218]: time="2025-07-12T00:40:38.031719238Z" level=info msg="StartContainer for \"a488770250da172b3c7d170fc58460ec1231c48111ae7636950e61d031a1fa6e\" returns successfully" Jul 12 00:40:38.051102 kubelet[1463]: I0712 00:40:38.050970 1463 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=10.79912164 podStartE2EDuration="11.050945302s" podCreationTimestamp="2025-07-12 00:40:27 +0000 UTC" firstStartedPulling="2025-07-12 00:40:37.701506664 +0000 UTC m=+46.211902340" lastFinishedPulling="2025-07-12 00:40:37.953330366 +0000 UTC m=+46.463726002" observedRunningTime="2025-07-12 00:40:38.050869528 +0000 UTC m=+46.561265204" watchObservedRunningTime="2025-07-12 00:40:38.050945302 +0000 UTC m=+46.561340978" Jul 12 00:40:38.782296 kubelet[1463]: E0712 00:40:38.782247 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:39.184895 systemd-networkd[1052]: cali5ec59c6bf6e: Gained IPv6LL Jul 12 00:40:39.783160 kubelet[1463]: E0712 00:40:39.783119 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:40.783988 kubelet[1463]: E0712 00:40:40.783942 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:41.784517 kubelet[1463]: E0712 00:40:41.784478 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:42.786092 kubelet[1463]: E0712 00:40:42.786042 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:43.786517 kubelet[1463]: E0712 00:40:43.786468 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 12 00:40:44.787582 kubelet[1463]: E0712 00:40:44.787539 1463 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"