Sep 9 00:40:06.685834 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Sep 9 00:40:06.685860 kernel: Linux version 5.15.191-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Sep 8 23:23:23 -00 2025 Sep 9 00:40:06.685869 kernel: efi: EFI v2.70 by EDK II Sep 9 00:40:06.685875 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Sep 9 00:40:06.685880 kernel: random: crng init done Sep 9 00:40:06.685886 kernel: ACPI: Early table checksum verification disabled Sep 9 00:40:06.685892 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Sep 9 00:40:06.685899 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Sep 9 00:40:06.685905 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685910 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685917 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685922 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685928 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685934 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685943 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685949 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685955 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:40:06.685961 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Sep 9 00:40:06.685967 kernel: NUMA: Failed to initialise from firmware Sep 9 00:40:06.685973 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Sep 9 00:40:06.685980 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Sep 9 00:40:06.685986 kernel: Zone ranges: Sep 9 00:40:06.685992 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Sep 9 00:40:06.685999 kernel: DMA32 empty Sep 9 00:40:06.686005 kernel: Normal empty Sep 9 00:40:06.686011 kernel: Movable zone start for each node Sep 9 00:40:06.686017 kernel: Early memory node ranges Sep 9 00:40:06.686023 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Sep 9 00:40:06.686029 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Sep 9 00:40:06.686034 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Sep 9 00:40:06.686040 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Sep 9 00:40:06.686046 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Sep 9 00:40:06.686052 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Sep 9 00:40:06.686058 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Sep 9 00:40:06.686064 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Sep 9 00:40:06.686071 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Sep 9 00:40:06.686078 kernel: psci: probing for conduit method from ACPI. Sep 9 00:40:06.686084 kernel: psci: PSCIv1.1 detected in firmware. Sep 9 00:40:06.686090 kernel: psci: Using standard PSCI v0.2 function IDs Sep 9 00:40:06.686096 kernel: psci: Trusted OS migration not required Sep 9 00:40:06.686104 kernel: psci: SMC Calling Convention v1.1 Sep 9 00:40:06.686110 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Sep 9 00:40:06.686118 kernel: ACPI: SRAT not present Sep 9 00:40:06.686125 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Sep 9 00:40:06.686131 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Sep 9 00:40:06.686138 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Sep 9 00:40:06.686144 kernel: Detected PIPT I-cache on CPU0 Sep 9 00:40:06.686150 kernel: CPU features: detected: GIC system register CPU interface Sep 9 00:40:06.686156 kernel: CPU features: detected: Hardware dirty bit management Sep 9 00:40:06.686162 kernel: CPU features: detected: Spectre-v4 Sep 9 00:40:06.686168 kernel: CPU features: detected: Spectre-BHB Sep 9 00:40:06.686175 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 9 00:40:06.686181 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 9 00:40:06.686187 kernel: CPU features: detected: ARM erratum 1418040 Sep 9 00:40:06.686193 kernel: CPU features: detected: SSBS not fully self-synchronizing Sep 9 00:40:06.686200 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Sep 9 00:40:06.686206 kernel: Policy zone: DMA Sep 9 00:40:06.686212 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=32b3b664430ec28e33efa673a32f74eb733fc8145822fbe5ce810188f7f71923 Sep 9 00:40:06.686219 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 9 00:40:06.686225 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 9 00:40:06.686231 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 9 00:40:06.686238 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 9 00:40:06.686246 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 114948K reserved, 0K cma-reserved) Sep 9 00:40:06.686252 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Sep 9 00:40:06.686258 kernel: trace event string verifier disabled Sep 9 00:40:06.686264 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 9 00:40:06.686271 kernel: rcu: RCU event tracing is enabled. Sep 9 00:40:06.686277 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Sep 9 00:40:06.686284 kernel: Trampoline variant of Tasks RCU enabled. Sep 9 00:40:06.686290 kernel: Tracing variant of Tasks RCU enabled. Sep 9 00:40:06.686296 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 9 00:40:06.686303 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Sep 9 00:40:06.686309 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 9 00:40:06.686316 kernel: GICv3: 256 SPIs implemented Sep 9 00:40:06.686322 kernel: GICv3: 0 Extended SPIs implemented Sep 9 00:40:06.686329 kernel: GICv3: Distributor has no Range Selector support Sep 9 00:40:06.686335 kernel: Root IRQ handler: gic_handle_irq Sep 9 00:40:06.686341 kernel: GICv3: 16 PPIs implemented Sep 9 00:40:06.686347 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Sep 9 00:40:06.686353 kernel: ACPI: SRAT not present Sep 9 00:40:06.686359 kernel: ITS [mem 0x08080000-0x0809ffff] Sep 9 00:40:06.686365 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Sep 9 00:40:06.686372 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Sep 9 00:40:06.686378 kernel: GICv3: using LPI property table @0x00000000400d0000 Sep 9 00:40:06.686384 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Sep 9 00:40:06.686405 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:40:06.686412 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Sep 9 00:40:06.686418 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Sep 9 00:40:06.686425 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Sep 9 00:40:06.686431 kernel: arm-pv: using stolen time PV Sep 9 00:40:06.686437 kernel: Console: colour dummy device 80x25 Sep 9 00:40:06.686444 kernel: ACPI: Core revision 20210730 Sep 9 00:40:06.686450 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Sep 9 00:40:06.686457 kernel: pid_max: default: 32768 minimum: 301 Sep 9 00:40:06.686463 kernel: LSM: Security Framework initializing Sep 9 00:40:06.686470 kernel: SELinux: Initializing. Sep 9 00:40:06.686477 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 9 00:40:06.686483 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 9 00:40:06.686489 kernel: rcu: Hierarchical SRCU implementation. Sep 9 00:40:06.686515 kernel: Platform MSI: ITS@0x8080000 domain created Sep 9 00:40:06.686522 kernel: PCI/MSI: ITS@0x8080000 domain created Sep 9 00:40:06.686528 kernel: Remapping and enabling EFI services. Sep 9 00:40:06.686534 kernel: smp: Bringing up secondary CPUs ... Sep 9 00:40:06.686541 kernel: Detected PIPT I-cache on CPU1 Sep 9 00:40:06.686550 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Sep 9 00:40:06.686556 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Sep 9 00:40:06.686563 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:40:06.686569 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Sep 9 00:40:06.686575 kernel: Detected PIPT I-cache on CPU2 Sep 9 00:40:06.686582 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Sep 9 00:40:06.686588 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Sep 9 00:40:06.686595 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:40:06.686601 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Sep 9 00:40:06.686608 kernel: Detected PIPT I-cache on CPU3 Sep 9 00:40:06.686616 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Sep 9 00:40:06.686622 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Sep 9 00:40:06.686628 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:40:06.686635 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Sep 9 00:40:06.686645 kernel: smp: Brought up 1 node, 4 CPUs Sep 9 00:40:06.686653 kernel: SMP: Total of 4 processors activated. Sep 9 00:40:06.686659 kernel: CPU features: detected: 32-bit EL0 Support Sep 9 00:40:06.686666 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Sep 9 00:40:06.686673 kernel: CPU features: detected: Common not Private translations Sep 9 00:40:06.686679 kernel: CPU features: detected: CRC32 instructions Sep 9 00:40:06.686686 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Sep 9 00:40:06.686693 kernel: CPU features: detected: LSE atomic instructions Sep 9 00:40:06.686701 kernel: CPU features: detected: Privileged Access Never Sep 9 00:40:06.686708 kernel: CPU features: detected: RAS Extension Support Sep 9 00:40:06.686714 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Sep 9 00:40:06.686721 kernel: CPU: All CPU(s) started at EL1 Sep 9 00:40:06.686728 kernel: alternatives: patching kernel code Sep 9 00:40:06.686743 kernel: devtmpfs: initialized Sep 9 00:40:06.686750 kernel: KASLR enabled Sep 9 00:40:06.686757 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 9 00:40:06.686764 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Sep 9 00:40:06.686771 kernel: pinctrl core: initialized pinctrl subsystem Sep 9 00:40:06.686778 kernel: SMBIOS 3.0.0 present. Sep 9 00:40:06.686784 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Sep 9 00:40:06.686791 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 9 00:40:06.686798 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 9 00:40:06.686807 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 9 00:40:06.686814 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 9 00:40:06.686821 kernel: audit: initializing netlink subsys (disabled) Sep 9 00:40:06.686828 kernel: audit: type=2000 audit(0.040:1): state=initialized audit_enabled=0 res=1 Sep 9 00:40:06.686834 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 9 00:40:06.686841 kernel: cpuidle: using governor menu Sep 9 00:40:06.686847 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 9 00:40:06.686854 kernel: ASID allocator initialised with 32768 entries Sep 9 00:40:06.686860 kernel: ACPI: bus type PCI registered Sep 9 00:40:06.686868 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 9 00:40:06.686875 kernel: Serial: AMBA PL011 UART driver Sep 9 00:40:06.686882 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 9 00:40:06.686888 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 9 00:40:06.686895 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 9 00:40:06.686902 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 9 00:40:06.686908 kernel: cryptd: max_cpu_qlen set to 1000 Sep 9 00:40:06.686915 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 9 00:40:06.686922 kernel: ACPI: Added _OSI(Module Device) Sep 9 00:40:06.686930 kernel: ACPI: Added _OSI(Processor Device) Sep 9 00:40:06.686937 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 9 00:40:06.686943 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 9 00:40:06.686950 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 9 00:40:06.686957 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 9 00:40:06.686964 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 9 00:40:06.686970 kernel: ACPI: Interpreter enabled Sep 9 00:40:06.686977 kernel: ACPI: Using GIC for interrupt routing Sep 9 00:40:06.686984 kernel: ACPI: MCFG table detected, 1 entries Sep 9 00:40:06.686992 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Sep 9 00:40:06.686998 kernel: printk: console [ttyAMA0] enabled Sep 9 00:40:06.687005 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 9 00:40:06.687144 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 9 00:40:06.687211 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 9 00:40:06.687272 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 9 00:40:06.687329 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Sep 9 00:40:06.687398 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Sep 9 00:40:06.687409 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Sep 9 00:40:06.687416 kernel: PCI host bridge to bus 0000:00 Sep 9 00:40:06.687490 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Sep 9 00:40:06.687546 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Sep 9 00:40:06.687599 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Sep 9 00:40:06.687653 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 9 00:40:06.687728 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Sep 9 00:40:06.687811 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Sep 9 00:40:06.687873 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Sep 9 00:40:06.687935 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Sep 9 00:40:06.687994 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Sep 9 00:40:06.688054 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Sep 9 00:40:06.688112 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Sep 9 00:40:06.688175 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Sep 9 00:40:06.688230 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Sep 9 00:40:06.688283 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Sep 9 00:40:06.688337 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Sep 9 00:40:06.688345 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Sep 9 00:40:06.688352 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Sep 9 00:40:06.688359 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Sep 9 00:40:06.688366 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Sep 9 00:40:06.688374 kernel: iommu: Default domain type: Translated Sep 9 00:40:06.688381 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 9 00:40:06.688387 kernel: vgaarb: loaded Sep 9 00:40:06.688402 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 9 00:40:06.688408 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 9 00:40:06.688415 kernel: PTP clock support registered Sep 9 00:40:06.688422 kernel: Registered efivars operations Sep 9 00:40:06.688429 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 9 00:40:06.688436 kernel: VFS: Disk quotas dquot_6.6.0 Sep 9 00:40:06.688444 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 9 00:40:06.688451 kernel: pnp: PnP ACPI init Sep 9 00:40:06.688522 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Sep 9 00:40:06.688532 kernel: pnp: PnP ACPI: found 1 devices Sep 9 00:40:06.688541 kernel: NET: Registered PF_INET protocol family Sep 9 00:40:06.688548 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 9 00:40:06.688555 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 9 00:40:06.688562 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 9 00:40:06.688570 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 9 00:40:06.688577 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 9 00:40:06.688584 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 9 00:40:06.688591 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 9 00:40:06.688598 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 9 00:40:06.688605 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 9 00:40:06.688612 kernel: PCI: CLS 0 bytes, default 64 Sep 9 00:40:06.688619 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Sep 9 00:40:06.688626 kernel: kvm [1]: HYP mode not available Sep 9 00:40:06.688640 kernel: Initialise system trusted keyrings Sep 9 00:40:06.688647 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 9 00:40:06.688653 kernel: Key type asymmetric registered Sep 9 00:40:06.688660 kernel: Asymmetric key parser 'x509' registered Sep 9 00:40:06.688666 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 9 00:40:06.688673 kernel: io scheduler mq-deadline registered Sep 9 00:40:06.688680 kernel: io scheduler kyber registered Sep 9 00:40:06.688687 kernel: io scheduler bfq registered Sep 9 00:40:06.688693 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Sep 9 00:40:06.688701 kernel: ACPI: button: Power Button [PWRB] Sep 9 00:40:06.688709 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Sep 9 00:40:06.688780 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Sep 9 00:40:06.688789 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 9 00:40:06.688796 kernel: thunder_xcv, ver 1.0 Sep 9 00:40:06.688803 kernel: thunder_bgx, ver 1.0 Sep 9 00:40:06.688810 kernel: nicpf, ver 1.0 Sep 9 00:40:06.688816 kernel: nicvf, ver 1.0 Sep 9 00:40:06.688886 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 9 00:40:06.688949 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-09T00:40:06 UTC (1757378406) Sep 9 00:40:06.688958 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 9 00:40:06.688965 kernel: NET: Registered PF_INET6 protocol family Sep 9 00:40:06.688971 kernel: Segment Routing with IPv6 Sep 9 00:40:06.688978 kernel: In-situ OAM (IOAM) with IPv6 Sep 9 00:40:06.688985 kernel: NET: Registered PF_PACKET protocol family Sep 9 00:40:06.688992 kernel: Key type dns_resolver registered Sep 9 00:40:06.688999 kernel: registered taskstats version 1 Sep 9 00:40:06.689007 kernel: Loading compiled-in X.509 certificates Sep 9 00:40:06.689014 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.191-flatcar: 14b3f28443a1a4b809c7c0337ab8c3dc8fdb5252' Sep 9 00:40:06.689021 kernel: Key type .fscrypt registered Sep 9 00:40:06.689027 kernel: Key type fscrypt-provisioning registered Sep 9 00:40:06.689034 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 9 00:40:06.689041 kernel: ima: Allocated hash algorithm: sha1 Sep 9 00:40:06.689048 kernel: ima: No architecture policies found Sep 9 00:40:06.689054 kernel: clk: Disabling unused clocks Sep 9 00:40:06.689061 kernel: Freeing unused kernel memory: 36416K Sep 9 00:40:06.689070 kernel: Run /init as init process Sep 9 00:40:06.689076 kernel: with arguments: Sep 9 00:40:06.689083 kernel: /init Sep 9 00:40:06.689090 kernel: with environment: Sep 9 00:40:06.689096 kernel: HOME=/ Sep 9 00:40:06.689103 kernel: TERM=linux Sep 9 00:40:06.689109 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 9 00:40:06.689118 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 9 00:40:06.689128 systemd[1]: Detected virtualization kvm. Sep 9 00:40:06.689135 systemd[1]: Detected architecture arm64. Sep 9 00:40:06.689142 systemd[1]: Running in initrd. Sep 9 00:40:06.689150 systemd[1]: No hostname configured, using default hostname. Sep 9 00:40:06.689157 systemd[1]: Hostname set to . Sep 9 00:40:06.689164 systemd[1]: Initializing machine ID from VM UUID. Sep 9 00:40:06.689172 systemd[1]: Queued start job for default target initrd.target. Sep 9 00:40:06.689179 systemd[1]: Started systemd-ask-password-console.path. Sep 9 00:40:06.689187 systemd[1]: Reached target cryptsetup.target. Sep 9 00:40:06.689194 systemd[1]: Reached target paths.target. Sep 9 00:40:06.689202 systemd[1]: Reached target slices.target. Sep 9 00:40:06.689209 systemd[1]: Reached target swap.target. Sep 9 00:40:06.689216 systemd[1]: Reached target timers.target. Sep 9 00:40:06.689224 systemd[1]: Listening on iscsid.socket. Sep 9 00:40:06.689231 systemd[1]: Listening on iscsiuio.socket. Sep 9 00:40:06.689239 systemd[1]: Listening on systemd-journald-audit.socket. Sep 9 00:40:06.689247 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 9 00:40:06.689254 systemd[1]: Listening on systemd-journald.socket. Sep 9 00:40:06.689261 systemd[1]: Listening on systemd-networkd.socket. Sep 9 00:40:06.689268 systemd[1]: Listening on systemd-udevd-control.socket. Sep 9 00:40:06.689275 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 9 00:40:06.689283 systemd[1]: Reached target sockets.target. Sep 9 00:40:06.689290 systemd[1]: Starting kmod-static-nodes.service... Sep 9 00:40:06.689297 systemd[1]: Finished network-cleanup.service. Sep 9 00:40:06.689305 systemd[1]: Starting systemd-fsck-usr.service... Sep 9 00:40:06.689313 systemd[1]: Starting systemd-journald.service... Sep 9 00:40:06.689319 systemd[1]: Starting systemd-modules-load.service... Sep 9 00:40:06.689327 systemd[1]: Starting systemd-resolved.service... Sep 9 00:40:06.689334 systemd[1]: Starting systemd-vconsole-setup.service... Sep 9 00:40:06.689341 systemd[1]: Finished kmod-static-nodes.service. Sep 9 00:40:06.689348 systemd[1]: Finished systemd-fsck-usr.service. Sep 9 00:40:06.689355 kernel: audit: type=1130 audit(1757378406.684:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.689362 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 9 00:40:06.689374 systemd-journald[290]: Journal started Sep 9 00:40:06.689424 systemd-journald[290]: Runtime Journal (/run/log/journal/d4403b4417d44c72b03651084328806c) is 6.0M, max 48.7M, 42.6M free. Sep 9 00:40:06.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.693470 systemd[1]: Started systemd-journald.service. Sep 9 00:40:06.693514 kernel: audit: type=1130 audit(1757378406.691:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.694674 systemd[1]: Finished systemd-vconsole-setup.service. Sep 9 00:40:06.698466 kernel: audit: type=1130 audit(1757378406.694:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.699309 systemd[1]: Starting dracut-cmdline-ask.service... Sep 9 00:40:06.709669 systemd-modules-load[291]: Inserted module 'overlay' Sep 9 00:40:06.714080 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 9 00:40:06.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.718495 kernel: audit: type=1130 audit(1757378406.714:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.727674 systemd[1]: Finished dracut-cmdline-ask.service. Sep 9 00:40:06.732694 kernel: audit: type=1130 audit(1757378406.728:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.729551 systemd[1]: Starting dracut-cmdline.service... Sep 9 00:40:06.731837 systemd-resolved[292]: Positive Trust Anchors: Sep 9 00:40:06.731845 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 9 00:40:06.739015 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 9 00:40:06.731873 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 9 00:40:06.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.736516 systemd-resolved[292]: Defaulting to hostname 'linux'. Sep 9 00:40:06.747336 kernel: audit: type=1130 audit(1757378406.739:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.747358 dracut-cmdline[308]: dracut-dracut-053 Sep 9 00:40:06.748525 kernel: Bridge firewalling registered Sep 9 00:40:06.737818 systemd[1]: Started systemd-resolved.service. Sep 9 00:40:06.739586 systemd[1]: Reached target nss-lookup.target. Sep 9 00:40:06.748468 systemd-modules-load[291]: Inserted module 'br_netfilter' Sep 9 00:40:06.750753 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=32b3b664430ec28e33efa673a32f74eb733fc8145822fbe5ce810188f7f71923 Sep 9 00:40:06.760407 kernel: SCSI subsystem initialized Sep 9 00:40:06.768057 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 9 00:40:06.768103 kernel: device-mapper: uevent: version 1.0.3 Sep 9 00:40:06.768114 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 9 00:40:06.770363 systemd-modules-load[291]: Inserted module 'dm_multipath' Sep 9 00:40:06.771204 systemd[1]: Finished systemd-modules-load.service. Sep 9 00:40:06.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.772777 systemd[1]: Starting systemd-sysctl.service... Sep 9 00:40:06.775612 kernel: audit: type=1130 audit(1757378406.771:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.782412 systemd[1]: Finished systemd-sysctl.service. Sep 9 00:40:06.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.786446 kernel: audit: type=1130 audit(1757378406.782:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.816413 kernel: Loading iSCSI transport class v2.0-870. Sep 9 00:40:06.828430 kernel: iscsi: registered transport (tcp) Sep 9 00:40:06.843440 kernel: iscsi: registered transport (qla4xxx) Sep 9 00:40:06.843463 kernel: QLogic iSCSI HBA Driver Sep 9 00:40:06.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.880290 systemd[1]: Finished dracut-cmdline.service. Sep 9 00:40:06.883616 kernel: audit: type=1130 audit(1757378406.880:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:06.881907 systemd[1]: Starting dracut-pre-udev.service... Sep 9 00:40:06.925435 kernel: raid6: neonx8 gen() 13728 MB/s Sep 9 00:40:06.944413 kernel: raid6: neonx8 xor() 5667 MB/s Sep 9 00:40:06.961416 kernel: raid6: neonx4 gen() 10447 MB/s Sep 9 00:40:06.978401 kernel: raid6: neonx4 xor() 11063 MB/s Sep 9 00:40:06.995410 kernel: raid6: neonx2 gen() 12897 MB/s Sep 9 00:40:07.012408 kernel: raid6: neonx2 xor() 10291 MB/s Sep 9 00:40:07.029415 kernel: raid6: neonx1 gen() 10564 MB/s Sep 9 00:40:07.046412 kernel: raid6: neonx1 xor() 8726 MB/s Sep 9 00:40:07.063415 kernel: raid6: int64x8 gen() 6229 MB/s Sep 9 00:40:07.080443 kernel: raid6: int64x8 xor() 3522 MB/s Sep 9 00:40:07.097424 kernel: raid6: int64x4 gen() 7182 MB/s Sep 9 00:40:07.114433 kernel: raid6: int64x4 xor() 3838 MB/s Sep 9 00:40:07.131428 kernel: raid6: int64x2 gen() 6128 MB/s Sep 9 00:40:07.148433 kernel: raid6: int64x2 xor() 3302 MB/s Sep 9 00:40:07.165425 kernel: raid6: int64x1 gen() 5033 MB/s Sep 9 00:40:07.182815 kernel: raid6: int64x1 xor() 2635 MB/s Sep 9 00:40:07.182846 kernel: raid6: using algorithm neonx8 gen() 13728 MB/s Sep 9 00:40:07.182855 kernel: raid6: .... xor() 5667 MB/s, rmw enabled Sep 9 00:40:07.182872 kernel: raid6: using neon recovery algorithm Sep 9 00:40:07.193616 kernel: xor: measuring software checksum speed Sep 9 00:40:07.193646 kernel: 8regs : 17002 MB/sec Sep 9 00:40:07.194682 kernel: 32regs : 20202 MB/sec Sep 9 00:40:07.194698 kernel: arm64_neon : 27804 MB/sec Sep 9 00:40:07.194706 kernel: xor: using function: arm64_neon (27804 MB/sec) Sep 9 00:40:07.247429 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 9 00:40:07.257061 systemd[1]: Finished dracut-pre-udev.service. Sep 9 00:40:07.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:07.257000 audit: BPF prog-id=7 op=LOAD Sep 9 00:40:07.257000 audit: BPF prog-id=8 op=LOAD Sep 9 00:40:07.258626 systemd[1]: Starting systemd-udevd.service... Sep 9 00:40:07.270159 systemd-udevd[492]: Using default interface naming scheme 'v252'. Sep 9 00:40:07.273429 systemd[1]: Started systemd-udevd.service. Sep 9 00:40:07.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:07.275239 systemd[1]: Starting dracut-pre-trigger.service... Sep 9 00:40:07.285526 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation Sep 9 00:40:07.311651 systemd[1]: Finished dracut-pre-trigger.service. Sep 9 00:40:07.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:07.313018 systemd[1]: Starting systemd-udev-trigger.service... Sep 9 00:40:07.346782 systemd[1]: Finished systemd-udev-trigger.service. Sep 9 00:40:07.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:07.372615 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Sep 9 00:40:07.377857 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 9 00:40:07.377875 kernel: GPT:9289727 != 19775487 Sep 9 00:40:07.377883 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 9 00:40:07.377892 kernel: GPT:9289727 != 19775487 Sep 9 00:40:07.377900 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 9 00:40:07.377908 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:40:07.389405 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (542) Sep 9 00:40:07.390994 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 9 00:40:07.395444 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 9 00:40:07.396215 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 9 00:40:07.403079 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 9 00:40:07.406329 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 9 00:40:07.407827 systemd[1]: Starting disk-uuid.service... Sep 9 00:40:07.413537 disk-uuid[563]: Primary Header is updated. Sep 9 00:40:07.413537 disk-uuid[563]: Secondary Entries is updated. Sep 9 00:40:07.413537 disk-uuid[563]: Secondary Header is updated. Sep 9 00:40:07.416416 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:40:07.419416 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:40:07.422417 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:40:08.422197 disk-uuid[564]: The operation has completed successfully. Sep 9 00:40:08.423226 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:40:08.445272 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 9 00:40:08.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.445370 systemd[1]: Finished disk-uuid.service. Sep 9 00:40:08.446776 systemd[1]: Starting verity-setup.service... Sep 9 00:40:08.461413 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 9 00:40:08.479961 systemd[1]: Found device dev-mapper-usr.device. Sep 9 00:40:08.481939 systemd[1]: Mounting sysusr-usr.mount... Sep 9 00:40:08.483903 systemd[1]: Finished verity-setup.service. Sep 9 00:40:08.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.528024 systemd[1]: Mounted sysusr-usr.mount. Sep 9 00:40:08.529074 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 9 00:40:08.528707 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 9 00:40:08.529411 systemd[1]: Starting ignition-setup.service... Sep 9 00:40:08.531334 systemd[1]: Starting parse-ip-for-networkd.service... Sep 9 00:40:08.538917 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Sep 9 00:40:08.538952 kernel: BTRFS info (device vda6): using free space tree Sep 9 00:40:08.538963 kernel: BTRFS info (device vda6): has skinny extents Sep 9 00:40:08.546287 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 9 00:40:08.551909 systemd[1]: Finished ignition-setup.service. Sep 9 00:40:08.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.553219 systemd[1]: Starting ignition-fetch-offline.service... Sep 9 00:40:08.597424 ignition[645]: Ignition 2.14.0 Sep 9 00:40:08.597435 ignition[645]: Stage: fetch-offline Sep 9 00:40:08.597474 ignition[645]: no configs at "/usr/lib/ignition/base.d" Sep 9 00:40:08.597483 ignition[645]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:40:08.597611 ignition[645]: parsed url from cmdline: "" Sep 9 00:40:08.597614 ignition[645]: no config URL provided Sep 9 00:40:08.597618 ignition[645]: reading system config file "/usr/lib/ignition/user.ign" Sep 9 00:40:08.597625 ignition[645]: no config at "/usr/lib/ignition/user.ign" Sep 9 00:40:08.597642 ignition[645]: op(1): [started] loading QEMU firmware config module Sep 9 00:40:08.597647 ignition[645]: op(1): executing: "modprobe" "qemu_fw_cfg" Sep 9 00:40:08.604911 ignition[645]: op(1): [finished] loading QEMU firmware config module Sep 9 00:40:08.604936 ignition[645]: QEMU firmware config was not found. Ignoring... Sep 9 00:40:08.611957 ignition[645]: parsing config with SHA512: bf3cb82769f6cc2867f3f8943b259ab0abacfd122a664c0db0fac2a12e5624a4081f12eb18415dc895176c5872cf81f2045ef8addcb26e79c28762580323497e Sep 9 00:40:08.617276 unknown[645]: fetched base config from "system" Sep 9 00:40:08.617286 unknown[645]: fetched user config from "qemu" Sep 9 00:40:08.617806 ignition[645]: fetch-offline: fetch-offline passed Sep 9 00:40:08.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.619626 systemd[1]: Finished ignition-fetch-offline.service. Sep 9 00:40:08.617883 ignition[645]: Ignition finished successfully Sep 9 00:40:08.627505 systemd[1]: Finished parse-ip-for-networkd.service. Sep 9 00:40:08.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.628000 audit: BPF prog-id=9 op=LOAD Sep 9 00:40:08.629299 systemd[1]: Starting systemd-networkd.service... Sep 9 00:40:08.647611 systemd-networkd[743]: lo: Link UP Sep 9 00:40:08.647624 systemd-networkd[743]: lo: Gained carrier Sep 9 00:40:08.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.648029 systemd-networkd[743]: Enumeration completed Sep 9 00:40:08.648091 systemd[1]: Started systemd-networkd.service. Sep 9 00:40:08.648217 systemd-networkd[743]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 9 00:40:08.649075 systemd[1]: Reached target network.target. Sep 9 00:40:08.649152 systemd-networkd[743]: eth0: Link UP Sep 9 00:40:08.649156 systemd-networkd[743]: eth0: Gained carrier Sep 9 00:40:08.650055 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Sep 9 00:40:08.650779 systemd[1]: Starting ignition-kargs.service... Sep 9 00:40:08.652429 systemd[1]: Starting iscsiuio.service... Sep 9 00:40:08.659407 systemd[1]: Started iscsiuio.service. Sep 9 00:40:08.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.660884 systemd[1]: Starting iscsid.service... Sep 9 00:40:08.661343 ignition[745]: Ignition 2.14.0 Sep 9 00:40:08.661349 ignition[745]: Stage: kargs Sep 9 00:40:08.661467 ignition[745]: no configs at "/usr/lib/ignition/base.d" Sep 9 00:40:08.663185 systemd[1]: Finished ignition-kargs.service. Sep 9 00:40:08.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.661477 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:40:08.665791 iscsid[754]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 9 00:40:08.665791 iscsid[754]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 9 00:40:08.665791 iscsid[754]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 9 00:40:08.665791 iscsid[754]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 9 00:40:08.665791 iscsid[754]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 9 00:40:08.665791 iscsid[754]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 9 00:40:08.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.662193 ignition[745]: kargs: kargs passed Sep 9 00:40:08.665094 systemd[1]: Starting ignition-disks.service... Sep 9 00:40:08.662233 ignition[745]: Ignition finished successfully Sep 9 00:40:08.667048 systemd[1]: Started iscsid.service. Sep 9 00:40:08.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.671947 ignition[755]: Ignition 2.14.0 Sep 9 00:40:08.667056 systemd-networkd[743]: eth0: DHCPv4 address 10.0.0.107/16, gateway 10.0.0.1 acquired from 10.0.0.1 Sep 9 00:40:08.671953 ignition[755]: Stage: disks Sep 9 00:40:08.668475 systemd[1]: Starting dracut-initqueue.service... Sep 9 00:40:08.672035 ignition[755]: no configs at "/usr/lib/ignition/base.d" Sep 9 00:40:08.674079 systemd[1]: Finished ignition-disks.service. Sep 9 00:40:08.672044 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:40:08.675149 systemd[1]: Reached target initrd-root-device.target. Sep 9 00:40:08.672789 ignition[755]: disks: disks passed Sep 9 00:40:08.676438 systemd[1]: Reached target local-fs-pre.target. Sep 9 00:40:08.672831 ignition[755]: Ignition finished successfully Sep 9 00:40:08.678020 systemd[1]: Reached target local-fs.target. Sep 9 00:40:08.679436 systemd[1]: Reached target sysinit.target. Sep 9 00:40:08.680401 systemd[1]: Reached target basic.target. Sep 9 00:40:08.681697 systemd[1]: Finished dracut-initqueue.service. Sep 9 00:40:08.682516 systemd[1]: Reached target remote-fs-pre.target. Sep 9 00:40:08.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.683356 systemd[1]: Reached target remote-cryptsetup.target. Sep 9 00:40:08.684337 systemd[1]: Reached target remote-fs.target. Sep 9 00:40:08.686555 systemd[1]: Starting dracut-pre-mount.service... Sep 9 00:40:08.693873 systemd[1]: Finished dracut-pre-mount.service. Sep 9 00:40:08.695220 systemd[1]: Starting systemd-fsck-root.service... Sep 9 00:40:08.712097 systemd-fsck[776]: ROOT: clean, 629/553520 files, 56027/553472 blocks Sep 9 00:40:08.717105 systemd[1]: Finished systemd-fsck-root.service. Sep 9 00:40:08.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.718948 systemd[1]: Mounting sysroot.mount... Sep 9 00:40:08.729312 systemd[1]: Mounted sysroot.mount. Sep 9 00:40:08.730339 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 9 00:40:08.730045 systemd[1]: Reached target initrd-root-fs.target. Sep 9 00:40:08.731979 systemd[1]: Mounting sysroot-usr.mount... Sep 9 00:40:08.732713 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 9 00:40:08.732761 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 9 00:40:08.732785 systemd[1]: Reached target ignition-diskful.target. Sep 9 00:40:08.734808 systemd[1]: Mounted sysroot-usr.mount. Sep 9 00:40:08.737242 systemd[1]: Starting initrd-setup-root.service... Sep 9 00:40:08.741508 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory Sep 9 00:40:08.746412 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Sep 9 00:40:08.750309 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory Sep 9 00:40:08.754142 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory Sep 9 00:40:08.780498 systemd[1]: Finished initrd-setup-root.service. Sep 9 00:40:08.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.781910 systemd[1]: Starting ignition-mount.service... Sep 9 00:40:08.783094 systemd[1]: Starting sysroot-boot.service... Sep 9 00:40:08.786995 bash[827]: umount: /sysroot/usr/share/oem: not mounted. Sep 9 00:40:08.796572 ignition[828]: INFO : Ignition 2.14.0 Sep 9 00:40:08.796572 ignition[828]: INFO : Stage: mount Sep 9 00:40:08.798522 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 9 00:40:08.798522 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:40:08.798522 ignition[828]: INFO : mount: mount passed Sep 9 00:40:08.798522 ignition[828]: INFO : Ignition finished successfully Sep 9 00:40:08.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:08.798695 systemd[1]: Finished ignition-mount.service. Sep 9 00:40:08.800471 systemd[1]: Finished sysroot-boot.service. Sep 9 00:40:09.490646 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 9 00:40:09.496911 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (837) Sep 9 00:40:09.496944 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Sep 9 00:40:09.496955 kernel: BTRFS info (device vda6): using free space tree Sep 9 00:40:09.497869 kernel: BTRFS info (device vda6): has skinny extents Sep 9 00:40:09.500496 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 9 00:40:09.501846 systemd[1]: Starting ignition-files.service... Sep 9 00:40:09.515323 ignition[857]: INFO : Ignition 2.14.0 Sep 9 00:40:09.515323 ignition[857]: INFO : Stage: files Sep 9 00:40:09.516748 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 9 00:40:09.516748 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:40:09.516748 ignition[857]: DEBUG : files: compiled without relabeling support, skipping Sep 9 00:40:09.519512 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 9 00:40:09.519512 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 9 00:40:09.519512 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 9 00:40:09.519512 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 9 00:40:09.519512 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 9 00:40:09.519283 unknown[857]: wrote ssh authorized keys file for user: core Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 9 00:40:09.525779 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 Sep 9 00:40:09.818575 systemd-networkd[743]: eth0: Gained IPv6LL Sep 9 00:40:09.897530 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Sep 9 00:40:10.292662 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 9 00:40:10.294331 ignition[857]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Sep 9 00:40:10.295487 ignition[857]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 9 00:40:10.295487 ignition[857]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 9 00:40:10.295487 ignition[857]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Sep 9 00:40:10.295487 ignition[857]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Sep 9 00:40:10.295487 ignition[857]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Sep 9 00:40:10.318925 ignition[857]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Sep 9 00:40:10.321149 ignition[857]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Sep 9 00:40:10.321149 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 9 00:40:10.321149 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 9 00:40:10.321149 ignition[857]: INFO : files: files passed Sep 9 00:40:10.321149 ignition[857]: INFO : Ignition finished successfully Sep 9 00:40:10.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.321305 systemd[1]: Finished ignition-files.service. Sep 9 00:40:10.323966 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 9 00:40:10.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.330587 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Sep 9 00:40:10.325118 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 9 00:40:10.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.333854 initrd-setup-root-after-ignition[884]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 9 00:40:10.325829 systemd[1]: Starting ignition-quench.service... Sep 9 00:40:10.328607 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 9 00:40:10.328695 systemd[1]: Finished ignition-quench.service. Sep 9 00:40:10.330823 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 9 00:40:10.332499 systemd[1]: Reached target ignition-complete.target. Sep 9 00:40:10.335016 systemd[1]: Starting initrd-parse-etc.service... Sep 9 00:40:10.347455 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 9 00:40:10.347550 systemd[1]: Finished initrd-parse-etc.service. Sep 9 00:40:10.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.349021 systemd[1]: Reached target initrd-fs.target. Sep 9 00:40:10.350059 systemd[1]: Reached target initrd.target. Sep 9 00:40:10.351179 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 9 00:40:10.351920 systemd[1]: Starting dracut-pre-pivot.service... Sep 9 00:40:10.362195 systemd[1]: Finished dracut-pre-pivot.service. Sep 9 00:40:10.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.363840 systemd[1]: Starting initrd-cleanup.service... Sep 9 00:40:10.371890 systemd[1]: Stopped target nss-lookup.target. Sep 9 00:40:10.372683 systemd[1]: Stopped target remote-cryptsetup.target. Sep 9 00:40:10.373922 systemd[1]: Stopped target timers.target. Sep 9 00:40:10.375076 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 9 00:40:10.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.375201 systemd[1]: Stopped dracut-pre-pivot.service. Sep 9 00:40:10.376311 systemd[1]: Stopped target initrd.target. Sep 9 00:40:10.377506 systemd[1]: Stopped target basic.target. Sep 9 00:40:10.378650 systemd[1]: Stopped target ignition-complete.target. Sep 9 00:40:10.379803 systemd[1]: Stopped target ignition-diskful.target. Sep 9 00:40:10.380959 systemd[1]: Stopped target initrd-root-device.target. Sep 9 00:40:10.382155 systemd[1]: Stopped target remote-fs.target. Sep 9 00:40:10.383351 systemd[1]: Stopped target remote-fs-pre.target. Sep 9 00:40:10.384626 systemd[1]: Stopped target sysinit.target. Sep 9 00:40:10.385750 systemd[1]: Stopped target local-fs.target. Sep 9 00:40:10.386921 systemd[1]: Stopped target local-fs-pre.target. Sep 9 00:40:10.388165 systemd[1]: Stopped target swap.target. Sep 9 00:40:10.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.389151 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 9 00:40:10.389267 systemd[1]: Stopped dracut-pre-mount.service. Sep 9 00:40:10.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.390324 systemd[1]: Stopped target cryptsetup.target. Sep 9 00:40:10.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.391213 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 9 00:40:10.391314 systemd[1]: Stopped dracut-initqueue.service. Sep 9 00:40:10.392528 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 9 00:40:10.392622 systemd[1]: Stopped ignition-fetch-offline.service. Sep 9 00:40:10.393676 systemd[1]: Stopped target paths.target. Sep 9 00:40:10.394580 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 9 00:40:10.398489 systemd[1]: Stopped systemd-ask-password-console.path. Sep 9 00:40:10.399241 systemd[1]: Stopped target slices.target. Sep 9 00:40:10.400335 systemd[1]: Stopped target sockets.target. Sep 9 00:40:10.401335 systemd[1]: iscsid.socket: Deactivated successfully. Sep 9 00:40:10.401416 systemd[1]: Closed iscsid.socket. Sep 9 00:40:10.402292 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 9 00:40:10.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.402356 systemd[1]: Closed iscsiuio.socket. Sep 9 00:40:10.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.403338 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 9 00:40:10.403453 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 9 00:40:10.404406 systemd[1]: ignition-files.service: Deactivated successfully. Sep 9 00:40:10.404498 systemd[1]: Stopped ignition-files.service. Sep 9 00:40:10.406421 systemd[1]: Stopping ignition-mount.service... Sep 9 00:40:10.408044 systemd[1]: Stopping sysroot-boot.service... Sep 9 00:40:10.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.409127 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 9 00:40:10.409244 systemd[1]: Stopped systemd-udev-trigger.service. Sep 9 00:40:10.410363 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 9 00:40:10.414385 ignition[897]: INFO : Ignition 2.14.0 Sep 9 00:40:10.414385 ignition[897]: INFO : Stage: umount Sep 9 00:40:10.414385 ignition[897]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 9 00:40:10.414385 ignition[897]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:40:10.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.410480 systemd[1]: Stopped dracut-pre-trigger.service. Sep 9 00:40:10.422153 ignition[897]: INFO : umount: umount passed Sep 9 00:40:10.422153 ignition[897]: INFO : Ignition finished successfully Sep 9 00:40:10.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.413700 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 9 00:40:10.413796 systemd[1]: Finished initrd-cleanup.service. Sep 9 00:40:10.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.416272 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 9 00:40:10.416353 systemd[1]: Stopped ignition-mount.service. Sep 9 00:40:10.419334 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 9 00:40:10.419673 systemd[1]: Stopped target network.target. Sep 9 00:40:10.421661 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 9 00:40:10.421725 systemd[1]: Stopped ignition-disks.service. Sep 9 00:40:10.422803 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 9 00:40:10.422843 systemd[1]: Stopped ignition-kargs.service. Sep 9 00:40:10.423844 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 9 00:40:10.423880 systemd[1]: Stopped ignition-setup.service. Sep 9 00:40:10.426247 systemd[1]: Stopping systemd-networkd.service... Sep 9 00:40:10.427232 systemd[1]: Stopping systemd-resolved.service... Sep 9 00:40:10.435921 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 9 00:40:10.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.436025 systemd[1]: Stopped systemd-resolved.service. Sep 9 00:40:10.441451 systemd-networkd[743]: eth0: DHCPv6 lease lost Sep 9 00:40:10.443164 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 9 00:40:10.442000 audit: BPF prog-id=6 op=UNLOAD Sep 9 00:40:10.443277 systemd[1]: Stopped systemd-networkd.service. Sep 9 00:40:10.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.444884 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 9 00:40:10.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.444964 systemd[1]: Stopped sysroot-boot.service. Sep 9 00:40:10.445699 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 9 00:40:10.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.445744 systemd[1]: Closed systemd-networkd.socket. Sep 9 00:40:10.448000 audit: BPF prog-id=9 op=UNLOAD Sep 9 00:40:10.446722 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 9 00:40:10.446762 systemd[1]: Stopped initrd-setup-root.service. Sep 9 00:40:10.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.448471 systemd[1]: Stopping network-cleanup.service... Sep 9 00:40:10.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.449484 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 9 00:40:10.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.449536 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 9 00:40:10.450932 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 9 00:40:10.450975 systemd[1]: Stopped systemd-sysctl.service. Sep 9 00:40:10.452592 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 9 00:40:10.452630 systemd[1]: Stopped systemd-modules-load.service. Sep 9 00:40:10.453366 systemd[1]: Stopping systemd-udevd.service... Sep 9 00:40:10.457616 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 9 00:40:10.461083 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 9 00:40:10.461177 systemd[1]: Stopped network-cleanup.service. Sep 9 00:40:10.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.462771 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 9 00:40:10.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.462891 systemd[1]: Stopped systemd-udevd.service. Sep 9 00:40:10.464060 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 9 00:40:10.464092 systemd[1]: Closed systemd-udevd-control.socket. Sep 9 00:40:10.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.465169 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 9 00:40:10.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.465204 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 9 00:40:10.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.466233 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 9 00:40:10.466270 systemd[1]: Stopped dracut-pre-udev.service. Sep 9 00:40:10.467665 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 9 00:40:10.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.467701 systemd[1]: Stopped dracut-cmdline.service. Sep 9 00:40:10.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.468878 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 9 00:40:10.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.468917 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 9 00:40:10.470801 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 9 00:40:10.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.472140 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 9 00:40:10.472196 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 9 00:40:10.474198 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 9 00:40:10.474237 systemd[1]: Stopped kmod-static-nodes.service. Sep 9 00:40:10.475128 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 9 00:40:10.475167 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 9 00:40:10.477138 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 9 00:40:10.477562 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 9 00:40:10.477638 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 9 00:40:10.479234 systemd[1]: Reached target initrd-switch-root.target. Sep 9 00:40:10.481048 systemd[1]: Starting initrd-switch-root.service... Sep 9 00:40:10.487323 systemd[1]: Switching root. Sep 9 00:40:10.501383 iscsid[754]: iscsid shutting down. Sep 9 00:40:10.501964 systemd-journald[290]: Received SIGTERM from PID 1 (n/a). Sep 9 00:40:10.502008 systemd-journald[290]: Journal stopped Sep 9 00:40:12.464923 kernel: SELinux: Class mctp_socket not defined in policy. Sep 9 00:40:12.464977 kernel: SELinux: Class anon_inode not defined in policy. Sep 9 00:40:12.464989 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 9 00:40:12.465001 kernel: SELinux: policy capability network_peer_controls=1 Sep 9 00:40:12.465015 kernel: SELinux: policy capability open_perms=1 Sep 9 00:40:12.465025 kernel: SELinux: policy capability extended_socket_class=1 Sep 9 00:40:12.465035 kernel: SELinux: policy capability always_check_network=0 Sep 9 00:40:12.465044 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 9 00:40:12.465054 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 9 00:40:12.465063 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 9 00:40:12.465073 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 9 00:40:12.465084 systemd[1]: Successfully loaded SELinux policy in 33.272ms. Sep 9 00:40:12.465108 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.164ms. Sep 9 00:40:12.465121 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 9 00:40:12.465133 systemd[1]: Detected virtualization kvm. Sep 9 00:40:12.465143 systemd[1]: Detected architecture arm64. Sep 9 00:40:12.465154 systemd[1]: Detected first boot. Sep 9 00:40:12.465164 systemd[1]: Initializing machine ID from VM UUID. Sep 9 00:40:12.465175 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 9 00:40:12.465187 systemd[1]: Populated /etc with preset unit settings. Sep 9 00:40:12.465198 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 9 00:40:12.465209 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 9 00:40:12.465221 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 9 00:40:12.465236 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 9 00:40:12.465246 systemd[1]: Stopped iscsiuio.service. Sep 9 00:40:12.465257 kernel: kauditd_printk_skb: 80 callbacks suppressed Sep 9 00:40:12.465267 kernel: audit: type=1334 audit(1757378412.347:84): prog-id=12 op=LOAD Sep 9 00:40:12.465278 kernel: audit: type=1334 audit(1757378412.347:85): prog-id=3 op=UNLOAD Sep 9 00:40:12.465288 kernel: audit: type=1334 audit(1757378412.347:86): prog-id=13 op=LOAD Sep 9 00:40:12.465298 kernel: audit: type=1334 audit(1757378412.347:87): prog-id=14 op=LOAD Sep 9 00:40:12.465307 kernel: audit: type=1334 audit(1757378412.347:88): prog-id=4 op=UNLOAD Sep 9 00:40:12.465317 kernel: audit: type=1334 audit(1757378412.347:89): prog-id=5 op=UNLOAD Sep 9 00:40:12.465327 kernel: audit: type=1334 audit(1757378412.348:90): prog-id=15 op=LOAD Sep 9 00:40:12.465337 kernel: audit: type=1334 audit(1757378412.348:91): prog-id=12 op=UNLOAD Sep 9 00:40:12.465347 kernel: audit: type=1334 audit(1757378412.348:92): prog-id=16 op=LOAD Sep 9 00:40:12.465358 kernel: audit: type=1334 audit(1757378412.348:93): prog-id=17 op=LOAD Sep 9 00:40:12.465371 systemd[1]: iscsid.service: Deactivated successfully. Sep 9 00:40:12.465382 systemd[1]: Stopped iscsid.service. Sep 9 00:40:12.465443 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 9 00:40:12.465457 systemd[1]: Stopped initrd-switch-root.service. Sep 9 00:40:12.465468 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 9 00:40:12.465479 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 9 00:40:12.465490 systemd[1]: Created slice system-addon\x2drun.slice. Sep 9 00:40:12.465501 systemd[1]: Created slice system-getty.slice. Sep 9 00:40:12.465513 systemd[1]: Created slice system-modprobe.slice. Sep 9 00:40:12.465524 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 9 00:40:12.465535 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 9 00:40:12.465547 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 9 00:40:12.465557 systemd[1]: Created slice user.slice. Sep 9 00:40:12.465568 systemd[1]: Started systemd-ask-password-console.path. Sep 9 00:40:12.465578 systemd[1]: Started systemd-ask-password-wall.path. Sep 9 00:40:12.465589 systemd[1]: Set up automount boot.automount. Sep 9 00:40:12.465599 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 9 00:40:12.465611 systemd[1]: Stopped target initrd-switch-root.target. Sep 9 00:40:12.465624 systemd[1]: Stopped target initrd-fs.target. Sep 9 00:40:12.465635 systemd[1]: Stopped target initrd-root-fs.target. Sep 9 00:40:12.465645 systemd[1]: Reached target integritysetup.target. Sep 9 00:40:12.465656 systemd[1]: Reached target remote-cryptsetup.target. Sep 9 00:40:12.465666 systemd[1]: Reached target remote-fs.target. Sep 9 00:40:12.465679 systemd[1]: Reached target slices.target. Sep 9 00:40:12.465690 systemd[1]: Reached target swap.target. Sep 9 00:40:12.465700 systemd[1]: Reached target torcx.target. Sep 9 00:40:12.465717 systemd[1]: Reached target veritysetup.target. Sep 9 00:40:12.465729 systemd[1]: Listening on systemd-coredump.socket. Sep 9 00:40:12.465740 systemd[1]: Listening on systemd-initctl.socket. Sep 9 00:40:12.465750 systemd[1]: Listening on systemd-networkd.socket. Sep 9 00:40:12.465760 systemd[1]: Listening on systemd-udevd-control.socket. Sep 9 00:40:12.465771 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 9 00:40:12.465782 systemd[1]: Listening on systemd-userdbd.socket. Sep 9 00:40:12.465793 systemd[1]: Mounting dev-hugepages.mount... Sep 9 00:40:12.465804 systemd[1]: Mounting dev-mqueue.mount... Sep 9 00:40:12.465815 systemd[1]: Mounting media.mount... Sep 9 00:40:12.465826 systemd[1]: Mounting sys-kernel-debug.mount... Sep 9 00:40:12.465836 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 9 00:40:12.465846 systemd[1]: Mounting tmp.mount... Sep 9 00:40:12.465857 systemd[1]: Starting flatcar-tmpfiles.service... Sep 9 00:40:12.465868 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:40:12.465878 systemd[1]: Starting kmod-static-nodes.service... Sep 9 00:40:12.465890 systemd[1]: Starting modprobe@configfs.service... Sep 9 00:40:12.465901 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:40:12.465912 systemd[1]: Starting modprobe@drm.service... Sep 9 00:40:12.465922 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:40:12.465932 systemd[1]: Starting modprobe@fuse.service... Sep 9 00:40:12.465943 systemd[1]: Starting modprobe@loop.service... Sep 9 00:40:12.465954 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 9 00:40:12.465965 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 9 00:40:12.465977 systemd[1]: Stopped systemd-fsck-root.service. Sep 9 00:40:12.465989 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 9 00:40:12.465999 systemd[1]: Stopped systemd-fsck-usr.service. Sep 9 00:40:12.466010 systemd[1]: Stopped systemd-journald.service. Sep 9 00:40:12.466020 kernel: fuse: init (API version 7.34) Sep 9 00:40:12.466030 systemd[1]: Starting systemd-journald.service... Sep 9 00:40:12.466040 kernel: loop: module loaded Sep 9 00:40:12.466051 systemd[1]: Starting systemd-modules-load.service... Sep 9 00:40:12.466062 systemd[1]: Starting systemd-network-generator.service... Sep 9 00:40:12.466073 systemd[1]: Starting systemd-remount-fs.service... Sep 9 00:40:12.466085 systemd[1]: Starting systemd-udev-trigger.service... Sep 9 00:40:12.466097 systemd[1]: verity-setup.service: Deactivated successfully. Sep 9 00:40:12.466108 systemd[1]: Stopped verity-setup.service. Sep 9 00:40:12.466118 systemd[1]: Mounted dev-hugepages.mount. Sep 9 00:40:12.466128 systemd[1]: Mounted dev-mqueue.mount. Sep 9 00:40:12.466139 systemd[1]: Mounted media.mount. Sep 9 00:40:12.466152 systemd-journald[1010]: Journal started Sep 9 00:40:12.466201 systemd-journald[1010]: Runtime Journal (/run/log/journal/d4403b4417d44c72b03651084328806c) is 6.0M, max 48.7M, 42.6M free. Sep 9 00:40:10.561000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 9 00:40:10.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 9 00:40:10.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 9 00:40:10.632000 audit: BPF prog-id=10 op=LOAD Sep 9 00:40:10.632000 audit: BPF prog-id=10 op=UNLOAD Sep 9 00:40:10.632000 audit: BPF prog-id=11 op=LOAD Sep 9 00:40:10.632000 audit: BPF prog-id=11 op=UNLOAD Sep 9 00:40:10.675000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 9 00:40:10.675000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:10.675000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 9 00:40:10.676000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 9 00:40:10.676000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:10.676000 audit: CWD cwd="/" Sep 9 00:40:10.676000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:10.676000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:10.676000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 9 00:40:12.347000 audit: BPF prog-id=12 op=LOAD Sep 9 00:40:12.347000 audit: BPF prog-id=3 op=UNLOAD Sep 9 00:40:12.347000 audit: BPF prog-id=13 op=LOAD Sep 9 00:40:12.347000 audit: BPF prog-id=14 op=LOAD Sep 9 00:40:12.347000 audit: BPF prog-id=4 op=UNLOAD Sep 9 00:40:12.347000 audit: BPF prog-id=5 op=UNLOAD Sep 9 00:40:12.348000 audit: BPF prog-id=15 op=LOAD Sep 9 00:40:12.348000 audit: BPF prog-id=12 op=UNLOAD Sep 9 00:40:12.348000 audit: BPF prog-id=16 op=LOAD Sep 9 00:40:12.348000 audit: BPF prog-id=17 op=LOAD Sep 9 00:40:12.348000 audit: BPF prog-id=13 op=UNLOAD Sep 9 00:40:12.348000 audit: BPF prog-id=14 op=UNLOAD Sep 9 00:40:12.349000 audit: BPF prog-id=18 op=LOAD Sep 9 00:40:12.466851 systemd[1]: Mounted sys-kernel-debug.mount. Sep 9 00:40:12.349000 audit: BPF prog-id=15 op=UNLOAD Sep 9 00:40:12.349000 audit: BPF prog-id=19 op=LOAD Sep 9 00:40:12.349000 audit: BPF prog-id=20 op=LOAD Sep 9 00:40:12.349000 audit: BPF prog-id=16 op=UNLOAD Sep 9 00:40:12.349000 audit: BPF prog-id=17 op=UNLOAD Sep 9 00:40:12.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.367000 audit: BPF prog-id=18 op=UNLOAD Sep 9 00:40:12.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.445000 audit: BPF prog-id=21 op=LOAD Sep 9 00:40:12.445000 audit: BPF prog-id=22 op=LOAD Sep 9 00:40:12.445000 audit: BPF prog-id=23 op=LOAD Sep 9 00:40:12.445000 audit: BPF prog-id=19 op=UNLOAD Sep 9 00:40:12.445000 audit: BPF prog-id=20 op=UNLOAD Sep 9 00:40:12.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.463000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 9 00:40:12.463000 audit[1010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffec993390 a2=4000 a3=1 items=0 ppid=1 pid=1010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:12.463000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 9 00:40:12.345957 systemd[1]: Queued start job for default target multi-user.target. Sep 9 00:40:10.673642 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 9 00:40:12.345972 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 9 00:40:10.673961 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 9 00:40:12.349930 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 9 00:40:10.673981 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 9 00:40:10.674014 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 9 00:40:10.674024 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 9 00:40:10.674054 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 9 00:40:10.674067 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 9 00:40:10.674265 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 9 00:40:10.674298 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 9 00:40:10.674311 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 9 00:40:10.674990 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 9 00:40:10.675028 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 9 00:40:12.468572 systemd[1]: Started systemd-journald.service. Sep 9 00:40:10.675046 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 9 00:40:10.675066 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 9 00:40:12.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:10.675085 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 9 00:40:10.675099 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 9 00:40:12.104251 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:12Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:40:12.104519 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:12Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:40:12.104622 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:12Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:40:12.104796 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:12Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:40:12.104848 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:12Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 9 00:40:12.104903 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-09-09T00:40:12Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 9 00:40:12.469163 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 9 00:40:12.469986 systemd[1]: Mounted tmp.mount. Sep 9 00:40:12.470761 systemd[1]: Finished flatcar-tmpfiles.service. Sep 9 00:40:12.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.471671 systemd[1]: Finished kmod-static-nodes.service. Sep 9 00:40:12.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.472617 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 9 00:40:12.472796 systemd[1]: Finished modprobe@configfs.service. Sep 9 00:40:12.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.473758 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:40:12.473914 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:40:12.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.474817 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 9 00:40:12.474975 systemd[1]: Finished modprobe@drm.service. Sep 9 00:40:12.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.475950 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:40:12.476106 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:40:12.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.477067 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 9 00:40:12.477212 systemd[1]: Finished modprobe@fuse.service. Sep 9 00:40:12.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.478292 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:40:12.478465 systemd[1]: Finished modprobe@loop.service. Sep 9 00:40:12.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.479335 systemd[1]: Finished systemd-modules-load.service. Sep 9 00:40:12.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.480524 systemd[1]: Finished systemd-network-generator.service. Sep 9 00:40:12.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.481535 systemd[1]: Finished systemd-remount-fs.service. Sep 9 00:40:12.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.482733 systemd[1]: Reached target network-pre.target. Sep 9 00:40:12.484772 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 9 00:40:12.486497 systemd[1]: Mounting sys-kernel-config.mount... Sep 9 00:40:12.487125 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 9 00:40:12.488870 systemd[1]: Starting systemd-hwdb-update.service... Sep 9 00:40:12.490723 systemd[1]: Starting systemd-journal-flush.service... Sep 9 00:40:12.491559 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 9 00:40:12.492472 systemd[1]: Starting systemd-random-seed.service... Sep 9 00:40:12.493171 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 9 00:40:12.494219 systemd[1]: Starting systemd-sysctl.service... Sep 9 00:40:12.496070 systemd[1]: Starting systemd-sysusers.service... Sep 9 00:40:12.499863 systemd-journald[1010]: Time spent on flushing to /var/log/journal/d4403b4417d44c72b03651084328806c is 17.073ms for 988 entries. Sep 9 00:40:12.499863 systemd-journald[1010]: System Journal (/var/log/journal/d4403b4417d44c72b03651084328806c) is 8.0M, max 195.6M, 187.6M free. Sep 9 00:40:12.528380 systemd-journald[1010]: Received client request to flush runtime journal. Sep 9 00:40:12.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.500279 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 9 00:40:12.529543 udevadm[1033]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 9 00:40:12.501894 systemd[1]: Mounted sys-kernel-config.mount. Sep 9 00:40:12.502916 systemd[1]: Finished systemd-random-seed.service. Sep 9 00:40:12.504041 systemd[1]: Reached target first-boot-complete.target. Sep 9 00:40:12.507105 systemd[1]: Finished systemd-udev-trigger.service. Sep 9 00:40:12.509220 systemd[1]: Starting systemd-udev-settle.service... Sep 9 00:40:12.516471 systemd[1]: Finished systemd-sysctl.service. Sep 9 00:40:12.519423 systemd[1]: Finished systemd-sysusers.service. Sep 9 00:40:12.521284 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 9 00:40:12.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.529320 systemd[1]: Finished systemd-journal-flush.service. Sep 9 00:40:12.537709 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 9 00:40:12.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.863359 systemd[1]: Finished systemd-hwdb-update.service. Sep 9 00:40:12.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.864000 audit: BPF prog-id=24 op=LOAD Sep 9 00:40:12.864000 audit: BPF prog-id=25 op=LOAD Sep 9 00:40:12.864000 audit: BPF prog-id=7 op=UNLOAD Sep 9 00:40:12.864000 audit: BPF prog-id=8 op=UNLOAD Sep 9 00:40:12.865470 systemd[1]: Starting systemd-udevd.service... Sep 9 00:40:12.880558 systemd-udevd[1037]: Using default interface naming scheme 'v252'. Sep 9 00:40:12.892883 systemd[1]: Started systemd-udevd.service. Sep 9 00:40:12.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.894000 audit: BPF prog-id=26 op=LOAD Sep 9 00:40:12.897961 systemd[1]: Starting systemd-networkd.service... Sep 9 00:40:12.901000 audit: BPF prog-id=27 op=LOAD Sep 9 00:40:12.901000 audit: BPF prog-id=28 op=LOAD Sep 9 00:40:12.901000 audit: BPF prog-id=29 op=LOAD Sep 9 00:40:12.902757 systemd[1]: Starting systemd-userdbd.service... Sep 9 00:40:12.913681 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Sep 9 00:40:12.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.930377 systemd[1]: Started systemd-userdbd.service. Sep 9 00:40:12.951927 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 9 00:40:12.974496 systemd-networkd[1052]: lo: Link UP Sep 9 00:40:12.974506 systemd-networkd[1052]: lo: Gained carrier Sep 9 00:40:12.974903 systemd-networkd[1052]: Enumeration completed Sep 9 00:40:12.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.975002 systemd[1]: Started systemd-networkd.service. Sep 9 00:40:12.975282 systemd-networkd[1052]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 9 00:40:12.976442 systemd-networkd[1052]: eth0: Link UP Sep 9 00:40:12.976453 systemd-networkd[1052]: eth0: Gained carrier Sep 9 00:40:12.997813 systemd[1]: Finished systemd-udev-settle.service. Sep 9 00:40:12.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:12.999753 systemd[1]: Starting lvm2-activation-early.service... Sep 9 00:40:13.001568 systemd-networkd[1052]: eth0: DHCPv4 address 10.0.0.107/16, gateway 10.0.0.1 acquired from 10.0.0.1 Sep 9 00:40:13.010826 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 9 00:40:13.037322 systemd[1]: Finished lvm2-activation-early.service. Sep 9 00:40:13.038245 systemd[1]: Reached target cryptsetup.target. Sep 9 00:40:13.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.040285 systemd[1]: Starting lvm2-activation.service... Sep 9 00:40:13.044281 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 9 00:40:13.083365 systemd[1]: Finished lvm2-activation.service. Sep 9 00:40:13.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.084167 systemd[1]: Reached target local-fs-pre.target. Sep 9 00:40:13.084883 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 9 00:40:13.084911 systemd[1]: Reached target local-fs.target. Sep 9 00:40:13.085497 systemd[1]: Reached target machines.target. Sep 9 00:40:13.087427 systemd[1]: Starting ldconfig.service... Sep 9 00:40:13.088331 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.088385 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:40:13.089442 systemd[1]: Starting systemd-boot-update.service... Sep 9 00:40:13.091365 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 9 00:40:13.093433 systemd[1]: Starting systemd-machine-id-commit.service... Sep 9 00:40:13.095092 systemd[1]: Starting systemd-sysext.service... Sep 9 00:40:13.096224 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) Sep 9 00:40:13.097315 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 9 00:40:13.104020 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 9 00:40:13.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.107680 systemd[1]: Unmounting usr-share-oem.mount... Sep 9 00:40:13.114917 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 9 00:40:13.115112 systemd[1]: Unmounted usr-share-oem.mount. Sep 9 00:40:13.125410 kernel: loop0: detected capacity change from 0 to 207008 Sep 9 00:40:13.163880 systemd[1]: Finished systemd-machine-id-commit.service. Sep 9 00:40:13.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.167402 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) Sep 9 00:40:13.167402 systemd-fsck[1081]: /dev/vda1: 236 files, 117310/258078 clusters Sep 9 00:40:13.169485 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 9 00:40:13.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.173426 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 9 00:40:13.203433 kernel: loop1: detected capacity change from 0 to 207008 Sep 9 00:40:13.207668 (sd-sysext)[1085]: Using extensions 'kubernetes'. Sep 9 00:40:13.207988 (sd-sysext)[1085]: Merged extensions into '/usr'. Sep 9 00:40:13.224229 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.225505 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:40:13.227505 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:40:13.229383 systemd[1]: Starting modprobe@loop.service... Sep 9 00:40:13.230049 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.230182 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:40:13.230948 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:40:13.231072 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:40:13.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.232304 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:40:13.232432 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:40:13.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.233694 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:40:13.233822 systemd[1]: Finished modprobe@loop.service. Sep 9 00:40:13.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.234898 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 9 00:40:13.234999 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.275389 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 9 00:40:13.279028 systemd[1]: Finished ldconfig.service. Sep 9 00:40:13.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.462036 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 9 00:40:13.463937 systemd[1]: Mounting boot.mount... Sep 9 00:40:13.465869 systemd[1]: Mounting usr-share-oem.mount... Sep 9 00:40:13.471897 systemd[1]: Mounted boot.mount. Sep 9 00:40:13.472715 systemd[1]: Mounted usr-share-oem.mount. Sep 9 00:40:13.475745 systemd[1]: Finished systemd-sysext.service. Sep 9 00:40:13.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.478154 systemd[1]: Starting ensure-sysext.service... Sep 9 00:40:13.480111 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 9 00:40:13.481546 systemd[1]: Finished systemd-boot-update.service. Sep 9 00:40:13.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.485489 systemd[1]: Reloading. Sep 9 00:40:13.490459 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 9 00:40:13.491178 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 9 00:40:13.492533 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 9 00:40:13.536647 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-09-09T00:40:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 9 00:40:13.537014 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-09-09T00:40:13Z" level=info msg="torcx already run" Sep 9 00:40:13.594107 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 9 00:40:13.594131 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 9 00:40:13.609773 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 9 00:40:13.651000 audit: BPF prog-id=30 op=LOAD Sep 9 00:40:13.651000 audit: BPF prog-id=26 op=UNLOAD Sep 9 00:40:13.652000 audit: BPF prog-id=31 op=LOAD Sep 9 00:40:13.652000 audit: BPF prog-id=32 op=LOAD Sep 9 00:40:13.652000 audit: BPF prog-id=24 op=UNLOAD Sep 9 00:40:13.652000 audit: BPF prog-id=25 op=UNLOAD Sep 9 00:40:13.652000 audit: BPF prog-id=33 op=LOAD Sep 9 00:40:13.652000 audit: BPF prog-id=27 op=UNLOAD Sep 9 00:40:13.652000 audit: BPF prog-id=34 op=LOAD Sep 9 00:40:13.652000 audit: BPF prog-id=35 op=LOAD Sep 9 00:40:13.652000 audit: BPF prog-id=28 op=UNLOAD Sep 9 00:40:13.652000 audit: BPF prog-id=29 op=UNLOAD Sep 9 00:40:13.654000 audit: BPF prog-id=36 op=LOAD Sep 9 00:40:13.654000 audit: BPF prog-id=21 op=UNLOAD Sep 9 00:40:13.654000 audit: BPF prog-id=37 op=LOAD Sep 9 00:40:13.654000 audit: BPF prog-id=38 op=LOAD Sep 9 00:40:13.654000 audit: BPF prog-id=22 op=UNLOAD Sep 9 00:40:13.654000 audit: BPF prog-id=23 op=UNLOAD Sep 9 00:40:13.657214 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 9 00:40:13.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.661601 systemd[1]: Starting audit-rules.service... Sep 9 00:40:13.663376 systemd[1]: Starting clean-ca-certificates.service... Sep 9 00:40:13.665644 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 9 00:40:13.666000 audit: BPF prog-id=39 op=LOAD Sep 9 00:40:13.669000 audit: BPF prog-id=40 op=LOAD Sep 9 00:40:13.668015 systemd[1]: Starting systemd-resolved.service... Sep 9 00:40:13.670278 systemd[1]: Starting systemd-timesyncd.service... Sep 9 00:40:13.672107 systemd[1]: Starting systemd-update-utmp.service... Sep 9 00:40:13.673476 systemd[1]: Finished clean-ca-certificates.service. Sep 9 00:40:13.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.676284 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:40:13.677000 audit[1163]: SYSTEM_BOOT pid=1163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.682035 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.683453 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:40:13.685280 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:40:13.687203 systemd[1]: Starting modprobe@loop.service... Sep 9 00:40:13.687988 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.688130 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:40:13.688227 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:40:13.689160 systemd[1]: Finished systemd-update-utmp.service. Sep 9 00:40:13.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.690711 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:40:13.690867 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:40:13.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.692165 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:40:13.692306 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:40:13.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.693739 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:40:13.693862 systemd[1]: Finished modprobe@loop.service. Sep 9 00:40:13.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:13.697520 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.699146 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:40:13.701234 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:40:13.702000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 9 00:40:13.702000 audit[1177]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe9ad95f0 a2=420 a3=0 items=0 ppid=1152 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:13.702000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 9 00:40:13.703179 augenrules[1177]: No rules Sep 9 00:40:13.703532 systemd[1]: Starting modprobe@loop.service... Sep 9 00:40:13.704268 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.704437 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:40:13.704537 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:40:13.705652 systemd[1]: Finished audit-rules.service. Sep 9 00:40:13.706740 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 9 00:40:13.708014 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:40:13.708132 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:40:13.709344 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:40:13.709504 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:40:13.710648 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:40:13.710782 systemd[1]: Finished modprobe@loop.service. Sep 9 00:40:13.714165 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.715340 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:40:13.717248 systemd[1]: Starting modprobe@drm.service... Sep 9 00:40:13.719236 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:40:13.721162 systemd[1]: Starting modprobe@loop.service... Sep 9 00:40:13.721914 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.722039 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:40:13.723255 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 9 00:40:13.724622 systemd-resolved[1158]: Positive Trust Anchors: Sep 9 00:40:13.724633 systemd-resolved[1158]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 9 00:40:13.724659 systemd-resolved[1158]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 9 00:40:13.725487 systemd[1]: Starting systemd-update-done.service... Sep 9 00:40:13.726261 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:40:13.726316 systemd-timesyncd[1162]: Contacted time server 10.0.0.1:123 (10.0.0.1). Sep 9 00:40:13.726370 systemd-timesyncd[1162]: Initial clock synchronization to Tue 2025-09-09 00:40:14.092717 UTC. Sep 9 00:40:13.727253 systemd[1]: Started systemd-timesyncd.service. Sep 9 00:40:13.728780 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:40:13.728910 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:40:13.730219 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 9 00:40:13.730338 systemd[1]: Finished modprobe@drm.service. Sep 9 00:40:13.731499 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:40:13.731620 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:40:13.732956 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:40:13.733078 systemd[1]: Finished modprobe@loop.service. Sep 9 00:40:13.734366 systemd[1]: Finished systemd-update-done.service. Sep 9 00:40:13.736113 systemd[1]: Reached target time-set.target. Sep 9 00:40:13.736892 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 9 00:40:13.736935 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.737213 systemd[1]: Finished ensure-sysext.service. Sep 9 00:40:13.738765 systemd-resolved[1158]: Defaulting to hostname 'linux'. Sep 9 00:40:13.740153 systemd[1]: Started systemd-resolved.service. Sep 9 00:40:13.740891 systemd[1]: Reached target network.target. Sep 9 00:40:13.741470 systemd[1]: Reached target nss-lookup.target. Sep 9 00:40:13.742086 systemd[1]: Reached target sysinit.target. Sep 9 00:40:13.742927 systemd[1]: Started motdgen.path. Sep 9 00:40:13.743482 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 9 00:40:13.744446 systemd[1]: Started logrotate.timer. Sep 9 00:40:13.745107 systemd[1]: Started mdadm.timer. Sep 9 00:40:13.745707 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 9 00:40:13.746336 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 9 00:40:13.746366 systemd[1]: Reached target paths.target. Sep 9 00:40:13.747137 systemd[1]: Reached target timers.target. Sep 9 00:40:13.748084 systemd[1]: Listening on dbus.socket. Sep 9 00:40:13.749727 systemd[1]: Starting docker.socket... Sep 9 00:40:13.752930 systemd[1]: Listening on sshd.socket. Sep 9 00:40:13.753715 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:40:13.754183 systemd[1]: Listening on docker.socket. Sep 9 00:40:13.754914 systemd[1]: Reached target sockets.target. Sep 9 00:40:13.755505 systemd[1]: Reached target basic.target. Sep 9 00:40:13.756095 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.756124 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 9 00:40:13.757197 systemd[1]: Starting containerd.service... Sep 9 00:40:13.758967 systemd[1]: Starting dbus.service... Sep 9 00:40:13.760570 systemd[1]: Starting enable-oem-cloudinit.service... Sep 9 00:40:13.762367 systemd[1]: Starting extend-filesystems.service... Sep 9 00:40:13.763200 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 9 00:40:13.764371 systemd[1]: Starting motdgen.service... Sep 9 00:40:13.765529 jq[1194]: false Sep 9 00:40:13.766382 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 9 00:40:13.768173 systemd[1]: Starting sshd-keygen.service... Sep 9 00:40:13.770994 systemd[1]: Starting systemd-logind.service... Sep 9 00:40:13.771733 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:40:13.771806 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 9 00:40:13.772378 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 9 00:40:13.773107 systemd[1]: Starting update-engine.service... Sep 9 00:40:13.775060 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 9 00:40:13.778079 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 9 00:40:13.778277 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 9 00:40:13.778691 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 9 00:40:13.778859 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 9 00:40:13.785618 jq[1209]: true Sep 9 00:40:13.788875 dbus-daemon[1193]: [system] SELinux support is enabled Sep 9 00:40:13.789037 systemd[1]: Started dbus.service. Sep 9 00:40:13.791579 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 9 00:40:13.791620 systemd[1]: Reached target system-config.target. Sep 9 00:40:13.792344 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 9 00:40:13.792374 systemd[1]: Reached target user-config.target. Sep 9 00:40:13.793281 extend-filesystems[1195]: Found loop1 Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda1 Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda2 Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda3 Sep 9 00:40:13.794092 extend-filesystems[1195]: Found usr Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda4 Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda6 Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda7 Sep 9 00:40:13.794092 extend-filesystems[1195]: Found vda9 Sep 9 00:40:13.794092 extend-filesystems[1195]: Checking size of /dev/vda9 Sep 9 00:40:13.794570 systemd[1]: motdgen.service: Deactivated successfully. Sep 9 00:40:13.794754 systemd[1]: Finished motdgen.service. Sep 9 00:40:13.800753 jq[1214]: true Sep 9 00:40:13.816054 extend-filesystems[1195]: Resized partition /dev/vda9 Sep 9 00:40:13.819824 extend-filesystems[1236]: resize2fs 1.46.5 (30-Dec-2021) Sep 9 00:40:13.826563 update_engine[1205]: I0909 00:40:13.825678 1205 main.cc:92] Flatcar Update Engine starting Sep 9 00:40:13.829245 systemd[1]: Started update-engine.service. Sep 9 00:40:13.829513 update_engine[1205]: I0909 00:40:13.829305 1205 update_check_scheduler.cc:74] Next update check in 11m1s Sep 9 00:40:13.831740 systemd[1]: Started locksmithd.service. Sep 9 00:40:13.834414 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Sep 9 00:40:13.846243 systemd-logind[1204]: Watching system buttons on /dev/input/event0 (Power Button) Sep 9 00:40:13.847548 systemd-logind[1204]: New seat seat0. Sep 9 00:40:13.850337 systemd[1]: Started systemd-logind.service. Sep 9 00:40:13.853447 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Sep 9 00:40:13.854423 bash[1241]: Updated "/home/core/.ssh/authorized_keys" Sep 9 00:40:13.855373 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 9 00:40:13.867195 extend-filesystems[1236]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 9 00:40:13.867195 extend-filesystems[1236]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 9 00:40:13.867195 extend-filesystems[1236]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Sep 9 00:40:13.871135 extend-filesystems[1195]: Resized filesystem in /dev/vda9 Sep 9 00:40:13.872125 env[1213]: time="2025-09-09T00:40:13.867778160Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 9 00:40:13.871818 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 9 00:40:13.871973 systemd[1]: Finished extend-filesystems.service. Sep 9 00:40:13.881711 locksmithd[1242]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 9 00:40:13.889490 env[1213]: time="2025-09-09T00:40:13.889432440Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 9 00:40:13.889635 env[1213]: time="2025-09-09T00:40:13.889616240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:40:13.890932 env[1213]: time="2025-09-09T00:40:13.890878000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.191-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 9 00:40:13.890932 env[1213]: time="2025-09-09T00:40:13.890908840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:40:13.891174 env[1213]: time="2025-09-09T00:40:13.891135760Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 9 00:40:13.891174 env[1213]: time="2025-09-09T00:40:13.891160520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 9 00:40:13.891230 env[1213]: time="2025-09-09T00:40:13.891182160Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 9 00:40:13.891230 env[1213]: time="2025-09-09T00:40:13.891192680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 9 00:40:13.891286 env[1213]: time="2025-09-09T00:40:13.891270920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:40:13.891677 env[1213]: time="2025-09-09T00:40:13.891642400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:40:13.891818 env[1213]: time="2025-09-09T00:40:13.891796840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 9 00:40:13.891846 env[1213]: time="2025-09-09T00:40:13.891820080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 9 00:40:13.891890 env[1213]: time="2025-09-09T00:40:13.891874880Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 9 00:40:13.891926 env[1213]: time="2025-09-09T00:40:13.891892600Z" level=info msg="metadata content store policy set" policy=shared Sep 9 00:40:13.895183 env[1213]: time="2025-09-09T00:40:13.895148320Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 9 00:40:13.895183 env[1213]: time="2025-09-09T00:40:13.895182720Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 9 00:40:13.895265 env[1213]: time="2025-09-09T00:40:13.895197600Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 9 00:40:13.895265 env[1213]: time="2025-09-09T00:40:13.895232480Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895265 env[1213]: time="2025-09-09T00:40:13.895249120Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895340 env[1213]: time="2025-09-09T00:40:13.895264960Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895340 env[1213]: time="2025-09-09T00:40:13.895278120Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895683 env[1213]: time="2025-09-09T00:40:13.895661720Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895722 env[1213]: time="2025-09-09T00:40:13.895688760Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895722 env[1213]: time="2025-09-09T00:40:13.895711760Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895764 env[1213]: time="2025-09-09T00:40:13.895726600Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.895764 env[1213]: time="2025-09-09T00:40:13.895741360Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 9 00:40:13.895892 env[1213]: time="2025-09-09T00:40:13.895872720Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 9 00:40:13.895973 env[1213]: time="2025-09-09T00:40:13.895958400Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 9 00:40:13.896265 env[1213]: time="2025-09-09T00:40:13.896234680Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 9 00:40:13.896297 env[1213]: time="2025-09-09T00:40:13.896284760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896319 env[1213]: time="2025-09-09T00:40:13.896302360Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 9 00:40:13.896437 env[1213]: time="2025-09-09T00:40:13.896425200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896462 env[1213]: time="2025-09-09T00:40:13.896441600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896462 env[1213]: time="2025-09-09T00:40:13.896454000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896504 env[1213]: time="2025-09-09T00:40:13.896466320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896504 env[1213]: time="2025-09-09T00:40:13.896479040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896504 env[1213]: time="2025-09-09T00:40:13.896491520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896504 env[1213]: time="2025-09-09T00:40:13.896502400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896576 env[1213]: time="2025-09-09T00:40:13.896513680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896576 env[1213]: time="2025-09-09T00:40:13.896527280Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 9 00:40:13.896702 env[1213]: time="2025-09-09T00:40:13.896677560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896727 env[1213]: time="2025-09-09T00:40:13.896710280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896748 env[1213]: time="2025-09-09T00:40:13.896728840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.896748 env[1213]: time="2025-09-09T00:40:13.896741760Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 9 00:40:13.896789 env[1213]: time="2025-09-09T00:40:13.896756160Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 9 00:40:13.896789 env[1213]: time="2025-09-09T00:40:13.896768160Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 9 00:40:13.896836 env[1213]: time="2025-09-09T00:40:13.896786120Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 9 00:40:13.896836 env[1213]: time="2025-09-09T00:40:13.896821160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 9 00:40:13.897065 env[1213]: time="2025-09-09T00:40:13.897016720Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 9 00:40:13.897963 env[1213]: time="2025-09-09T00:40:13.897076960Z" level=info msg="Connect containerd service" Sep 9 00:40:13.897963 env[1213]: time="2025-09-09T00:40:13.897113960Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 9 00:40:13.898123 env[1213]: time="2025-09-09T00:40:13.898094160Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 9 00:40:13.898499 env[1213]: time="2025-09-09T00:40:13.898466960Z" level=info msg="Start subscribing containerd event" Sep 9 00:40:13.898526 env[1213]: time="2025-09-09T00:40:13.898519160Z" level=info msg="Start recovering state" Sep 9 00:40:13.898587 env[1213]: time="2025-09-09T00:40:13.898575200Z" level=info msg="Start event monitor" Sep 9 00:40:13.898609 env[1213]: time="2025-09-09T00:40:13.898596920Z" level=info msg="Start snapshots syncer" Sep 9 00:40:13.898609 env[1213]: time="2025-09-09T00:40:13.898606400Z" level=info msg="Start cni network conf syncer for default" Sep 9 00:40:13.898656 env[1213]: time="2025-09-09T00:40:13.898613760Z" level=info msg="Start streaming server" Sep 9 00:40:13.898793 env[1213]: time="2025-09-09T00:40:13.898776960Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 9 00:40:13.898837 env[1213]: time="2025-09-09T00:40:13.898825880Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 9 00:40:13.898978 systemd[1]: Started containerd.service. Sep 9 00:40:13.899844 env[1213]: time="2025-09-09T00:40:13.899806600Z" level=info msg="containerd successfully booted in 0.042996s" Sep 9 00:40:14.811205 systemd-networkd[1052]: eth0: Gained IPv6LL Sep 9 00:40:14.812999 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 9 00:40:14.814254 systemd[1]: Reached target network-online.target. Sep 9 00:40:14.816611 systemd[1]: Starting kubelet.service... Sep 9 00:40:15.438203 systemd[1]: Started kubelet.service. Sep 9 00:40:15.813862 kubelet[1256]: E0909 00:40:15.813755 1256 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 9 00:40:15.815906 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 9 00:40:15.816055 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 9 00:40:15.890127 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 9 00:40:15.908044 systemd[1]: Finished sshd-keygen.service. Sep 9 00:40:15.910196 systemd[1]: Starting issuegen.service... Sep 9 00:40:15.914724 systemd[1]: issuegen.service: Deactivated successfully. Sep 9 00:40:15.914882 systemd[1]: Finished issuegen.service. Sep 9 00:40:15.916824 systemd[1]: Starting systemd-user-sessions.service... Sep 9 00:40:15.922657 systemd[1]: Finished systemd-user-sessions.service. Sep 9 00:40:15.924731 systemd[1]: Started getty@tty1.service. Sep 9 00:40:15.926653 systemd[1]: Started serial-getty@ttyAMA0.service. Sep 9 00:40:15.927556 systemd[1]: Reached target getty.target. Sep 9 00:40:15.928223 systemd[1]: Reached target multi-user.target. Sep 9 00:40:15.930075 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 9 00:40:15.936940 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 9 00:40:15.937099 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 9 00:40:15.938032 systemd[1]: Startup finished in 539ms (kernel) + 3.973s (initrd) + 5.413s (userspace) = 9.926s. Sep 9 00:40:18.919012 systemd[1]: Created slice system-sshd.slice. Sep 9 00:40:18.920158 systemd[1]: Started sshd@0-10.0.0.107:22-10.0.0.1:33580.service. Sep 9 00:40:18.968726 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 33580 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:40:18.970682 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:18.979347 systemd-logind[1204]: New session 1 of user core. Sep 9 00:40:18.980259 systemd[1]: Created slice user-500.slice. Sep 9 00:40:18.981317 systemd[1]: Starting user-runtime-dir@500.service... Sep 9 00:40:18.989841 systemd[1]: Finished user-runtime-dir@500.service. Sep 9 00:40:18.991259 systemd[1]: Starting user@500.service... Sep 9 00:40:18.994317 (systemd)[1282]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:19.055411 systemd[1282]: Queued start job for default target default.target. Sep 9 00:40:19.055942 systemd[1282]: Reached target paths.target. Sep 9 00:40:19.055974 systemd[1282]: Reached target sockets.target. Sep 9 00:40:19.055986 systemd[1282]: Reached target timers.target. Sep 9 00:40:19.055996 systemd[1282]: Reached target basic.target. Sep 9 00:40:19.056037 systemd[1282]: Reached target default.target. Sep 9 00:40:19.056062 systemd[1282]: Startup finished in 55ms. Sep 9 00:40:19.056135 systemd[1]: Started user@500.service. Sep 9 00:40:19.057392 systemd[1]: Started session-1.scope. Sep 9 00:40:19.110028 systemd[1]: Started sshd@1-10.0.0.107:22-10.0.0.1:33592.service. Sep 9 00:40:19.151864 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 33592 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:40:19.153635 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:19.157481 systemd-logind[1204]: New session 2 of user core. Sep 9 00:40:19.158342 systemd[1]: Started session-2.scope. Sep 9 00:40:19.214173 sshd[1291]: pam_unix(sshd:session): session closed for user core Sep 9 00:40:19.217689 systemd[1]: Started sshd@2-10.0.0.107:22-10.0.0.1:33606.service. Sep 9 00:40:19.218209 systemd[1]: sshd@1-10.0.0.107:22-10.0.0.1:33592.service: Deactivated successfully. Sep 9 00:40:19.218936 systemd[1]: session-2.scope: Deactivated successfully. Sep 9 00:40:19.219482 systemd-logind[1204]: Session 2 logged out. Waiting for processes to exit. Sep 9 00:40:19.220323 systemd-logind[1204]: Removed session 2. Sep 9 00:40:19.261281 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 33606 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:40:19.262583 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:19.265948 systemd-logind[1204]: New session 3 of user core. Sep 9 00:40:19.266838 systemd[1]: Started session-3.scope. Sep 9 00:40:19.317532 sshd[1296]: pam_unix(sshd:session): session closed for user core Sep 9 00:40:19.320740 systemd[1]: sshd@2-10.0.0.107:22-10.0.0.1:33606.service: Deactivated successfully. Sep 9 00:40:19.321391 systemd[1]: session-3.scope: Deactivated successfully. Sep 9 00:40:19.321932 systemd-logind[1204]: Session 3 logged out. Waiting for processes to exit. Sep 9 00:40:19.323126 systemd[1]: Started sshd@3-10.0.0.107:22-10.0.0.1:33622.service. Sep 9 00:40:19.323866 systemd-logind[1204]: Removed session 3. Sep 9 00:40:19.366012 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 33622 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:40:19.367298 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:19.370604 systemd-logind[1204]: New session 4 of user core. Sep 9 00:40:19.371503 systemd[1]: Started session-4.scope. Sep 9 00:40:19.426356 sshd[1303]: pam_unix(sshd:session): session closed for user core Sep 9 00:40:19.429157 systemd[1]: sshd@3-10.0.0.107:22-10.0.0.1:33622.service: Deactivated successfully. Sep 9 00:40:19.429790 systemd[1]: session-4.scope: Deactivated successfully. Sep 9 00:40:19.430504 systemd-logind[1204]: Session 4 logged out. Waiting for processes to exit. Sep 9 00:40:19.431676 systemd[1]: Started sshd@4-10.0.0.107:22-10.0.0.1:33634.service. Sep 9 00:40:19.432418 systemd-logind[1204]: Removed session 4. Sep 9 00:40:19.474321 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 33634 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:40:19.476162 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:19.481901 systemd-logind[1204]: New session 5 of user core. Sep 9 00:40:19.482802 systemd[1]: Started session-5.scope. Sep 9 00:40:19.542678 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 9 00:40:19.542903 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:40:19.555614 dbus-daemon[1193]: avc: received setenforce notice (enforcing=1) Sep 9 00:40:19.556451 sudo[1312]: pam_unix(sudo:session): session closed for user root Sep 9 00:40:19.559376 sshd[1309]: pam_unix(sshd:session): session closed for user core Sep 9 00:40:19.562707 systemd[1]: Started sshd@5-10.0.0.107:22-10.0.0.1:33646.service. Sep 9 00:40:19.563308 systemd[1]: sshd@4-10.0.0.107:22-10.0.0.1:33634.service: Deactivated successfully. Sep 9 00:40:19.563973 systemd[1]: session-5.scope: Deactivated successfully. Sep 9 00:40:19.564631 systemd-logind[1204]: Session 5 logged out. Waiting for processes to exit. Sep 9 00:40:19.565508 systemd-logind[1204]: Removed session 5. Sep 9 00:40:19.605285 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 33646 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:40:19.606950 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:19.610477 systemd-logind[1204]: New session 6 of user core. Sep 9 00:40:19.611222 systemd[1]: Started session-6.scope. Sep 9 00:40:19.664065 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 9 00:40:19.664293 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:40:19.667219 sudo[1320]: pam_unix(sudo:session): session closed for user root Sep 9 00:40:19.671972 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 9 00:40:19.672206 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:40:19.680987 systemd[1]: Stopping audit-rules.service... Sep 9 00:40:19.681000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 9 00:40:19.682603 kernel: kauditd_printk_skb: 111 callbacks suppressed Sep 9 00:40:19.682651 kernel: audit: type=1305 audit(1757378419.681:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 9 00:40:19.682694 auditctl[1323]: No rules Sep 9 00:40:19.681000 audit[1323]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc976e6f0 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:19.684278 systemd[1]: audit-rules.service: Deactivated successfully. Sep 9 00:40:19.684467 systemd[1]: Stopped audit-rules.service. Sep 9 00:40:19.685954 systemd[1]: Starting audit-rules.service... Sep 9 00:40:19.686894 kernel: audit: type=1300 audit(1757378419.681:201): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc976e6f0 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:19.686958 kernel: audit: type=1327 audit(1757378419.681:201): proctitle=2F7362696E2F617564697463746C002D44 Sep 9 00:40:19.681000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 9 00:40:19.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.689696 kernel: audit: type=1131 audit(1757378419.684:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.700849 augenrules[1340]: No rules Sep 9 00:40:19.701716 systemd[1]: Finished audit-rules.service. Sep 9 00:40:19.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.702000 audit[1319]: USER_END pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.703563 sudo[1319]: pam_unix(sudo:session): session closed for user root Sep 9 00:40:19.705111 sshd[1315]: pam_unix(sshd:session): session closed for user core Sep 9 00:40:19.706721 kernel: audit: type=1130 audit(1757378419.700:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.706776 kernel: audit: type=1106 audit(1757378419.702:204): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.706810 kernel: audit: type=1104 audit(1757378419.702:205): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.702000 audit[1319]: CRED_DISP pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.708734 systemd[1]: Started sshd@6-10.0.0.107:22-10.0.0.1:33654.service. Sep 9 00:40:19.706000 audit[1315]: USER_END pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.709408 systemd[1]: sshd@5-10.0.0.107:22-10.0.0.1:33646.service: Deactivated successfully. Sep 9 00:40:19.710170 systemd[1]: session-6.scope: Deactivated successfully. Sep 9 00:40:19.711171 systemd-logind[1204]: Session 6 logged out. Waiting for processes to exit. Sep 9 00:40:19.711799 kernel: audit: type=1106 audit(1757378419.706:206): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.711866 kernel: audit: type=1104 audit(1757378419.706:207): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.706000 audit[1315]: CRED_DISP pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.711832 systemd-logind[1204]: Removed session 6. Sep 9 00:40:19.714024 kernel: audit: type=1130 audit(1757378419.707:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.107:22-10.0.0.1:33654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.107:22-10.0.0.1:33654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.107:22-10.0.0.1:33646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.750000 audit[1345]: USER_ACCT pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.752198 sshd[1345]: Accepted publickey for core from 10.0.0.1 port 33654 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:40:19.752000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.752000 audit[1345]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd1651e0 a2=3 a3=1 items=0 ppid=1 pid=1345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:19.752000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 9 00:40:19.754352 sshd[1345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:40:19.758585 systemd[1]: Started session-7.scope. Sep 9 00:40:19.758741 systemd-logind[1204]: New session 7 of user core. Sep 9 00:40:19.760000 audit[1345]: USER_START pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.761000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:19.811000 audit[1349]: USER_ACCT pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.811760 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 9 00:40:19.811000 audit[1349]: CRED_REFR pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.812009 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:40:19.813000 audit[1349]: USER_START pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.824395 systemd[1]: Starting coreos-metadata.service... Sep 9 00:40:19.831057 systemd[1]: coreos-metadata.service: Deactivated successfully. Sep 9 00:40:19.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:19.831346 systemd[1]: Finished coreos-metadata.service. Sep 9 00:40:20.253635 systemd[1]: Stopped kubelet.service. Sep 9 00:40:20.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:20.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:20.255708 systemd[1]: Starting kubelet.service... Sep 9 00:40:20.278175 systemd[1]: Reloading. Sep 9 00:40:20.348355 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2025-09-09T00:40:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 9 00:40:20.348386 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2025-09-09T00:40:20Z" level=info msg="torcx already run" Sep 9 00:40:20.440873 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 9 00:40:20.440895 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 9 00:40:20.456927 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit: BPF prog-id=46 op=LOAD Sep 9 00:40:20.506000 audit: BPF prog-id=30 op=UNLOAD Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.506000 audit: BPF prog-id=47 op=LOAD Sep 9 00:40:20.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit: BPF prog-id=48 op=LOAD Sep 9 00:40:20.507000 audit: BPF prog-id=31 op=UNLOAD Sep 9 00:40:20.507000 audit: BPF prog-id=32 op=UNLOAD Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.507000 audit: BPF prog-id=49 op=LOAD Sep 9 00:40:20.507000 audit: BPF prog-id=44 op=UNLOAD Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.508000 audit: BPF prog-id=50 op=LOAD Sep 9 00:40:20.508000 audit: BPF prog-id=40 op=UNLOAD Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit: BPF prog-id=51 op=LOAD Sep 9 00:40:20.509000 audit: BPF prog-id=41 op=UNLOAD Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit: BPF prog-id=52 op=LOAD Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.509000 audit: BPF prog-id=53 op=LOAD Sep 9 00:40:20.509000 audit: BPF prog-id=42 op=UNLOAD Sep 9 00:40:20.509000 audit: BPF prog-id=43 op=UNLOAD Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit: BPF prog-id=54 op=LOAD Sep 9 00:40:20.510000 audit: BPF prog-id=33 op=UNLOAD Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit: BPF prog-id=55 op=LOAD Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.510000 audit: BPF prog-id=56 op=LOAD Sep 9 00:40:20.510000 audit: BPF prog-id=34 op=UNLOAD Sep 9 00:40:20.510000 audit: BPF prog-id=35 op=UNLOAD Sep 9 00:40:20.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit: BPF prog-id=57 op=LOAD Sep 9 00:40:20.512000 audit: BPF prog-id=39 op=UNLOAD Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit: BPF prog-id=58 op=LOAD Sep 9 00:40:20.513000 audit: BPF prog-id=36 op=UNLOAD Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit: BPF prog-id=59 op=LOAD Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:20.513000 audit: BPF prog-id=60 op=LOAD Sep 9 00:40:20.513000 audit: BPF prog-id=37 op=UNLOAD Sep 9 00:40:20.513000 audit: BPF prog-id=38 op=UNLOAD Sep 9 00:40:20.532260 systemd[1]: Started kubelet.service. Sep 9 00:40:20.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:20.534099 systemd[1]: Stopping kubelet.service... Sep 9 00:40:20.534333 systemd[1]: kubelet.service: Deactivated successfully. Sep 9 00:40:20.534517 systemd[1]: Stopped kubelet.service. Sep 9 00:40:20.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:20.536053 systemd[1]: Starting kubelet.service... Sep 9 00:40:20.632867 systemd[1]: Started kubelet.service. Sep 9 00:40:20.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:20.668627 kubelet[1454]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 9 00:40:20.668627 kubelet[1454]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 9 00:40:20.668627 kubelet[1454]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 9 00:40:20.668970 kubelet[1454]: I0909 00:40:20.668732 1454 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 9 00:40:21.751837 kubelet[1454]: I0909 00:40:21.751786 1454 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 9 00:40:21.751837 kubelet[1454]: I0909 00:40:21.751822 1454 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 9 00:40:21.752154 kubelet[1454]: I0909 00:40:21.752093 1454 server.go:954] "Client rotation is on, will bootstrap in background" Sep 9 00:40:21.777250 kubelet[1454]: I0909 00:40:21.777201 1454 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 9 00:40:21.784862 kubelet[1454]: E0909 00:40:21.784827 1454 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 9 00:40:21.785004 kubelet[1454]: I0909 00:40:21.784987 1454 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 9 00:40:21.788717 kubelet[1454]: I0909 00:40:21.788688 1454 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 9 00:40:21.790734 kubelet[1454]: I0909 00:40:21.790678 1454 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 9 00:40:21.791028 kubelet[1454]: I0909 00:40:21.790849 1454 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.107","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 9 00:40:21.791287 kubelet[1454]: I0909 00:40:21.791257 1454 topology_manager.go:138] "Creating topology manager with none policy" Sep 9 00:40:21.791358 kubelet[1454]: I0909 00:40:21.791347 1454 container_manager_linux.go:304] "Creating device plugin manager" Sep 9 00:40:21.791616 kubelet[1454]: I0909 00:40:21.791599 1454 state_mem.go:36] "Initialized new in-memory state store" Sep 9 00:40:21.799115 kubelet[1454]: I0909 00:40:21.799086 1454 kubelet.go:446] "Attempting to sync node with API server" Sep 9 00:40:21.799292 kubelet[1454]: I0909 00:40:21.799274 1454 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 9 00:40:21.799395 kubelet[1454]: I0909 00:40:21.799383 1454 kubelet.go:352] "Adding apiserver pod source" Sep 9 00:40:21.799635 kubelet[1454]: I0909 00:40:21.799619 1454 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 9 00:40:21.800900 kubelet[1454]: E0909 00:40:21.800861 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:21.807361 kubelet[1454]: E0909 00:40:21.807318 1454 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:21.812696 kubelet[1454]: I0909 00:40:21.812674 1454 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 9 00:40:21.813280 kubelet[1454]: I0909 00:40:21.813267 1454 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 9 00:40:21.813390 kubelet[1454]: W0909 00:40:21.813378 1454 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 9 00:40:21.816111 kubelet[1454]: I0909 00:40:21.816087 1454 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 9 00:40:21.816176 kubelet[1454]: I0909 00:40:21.816129 1454 server.go:1287] "Started kubelet" Sep 9 00:40:21.816299 kubelet[1454]: I0909 00:40:21.816270 1454 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 9 00:40:21.817277 kubelet[1454]: I0909 00:40:21.817214 1454 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 9 00:40:21.817806 kubelet[1454]: I0909 00:40:21.817788 1454 server.go:479] "Adding debug handlers to kubelet server" Sep 9 00:40:21.817910 kubelet[1454]: I0909 00:40:21.817876 1454 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 9 00:40:21.817000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:21.817000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 9 00:40:21.817000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009f60f0 a1=4000c24e10 a2=40009f60c0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.817000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 9 00:40:21.818000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:21.818000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 9 00:40:21.818000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000503c00 a1=4000c24e28 a2=40009f6180 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.818000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 9 00:40:21.818855 kubelet[1454]: I0909 00:40:21.818398 1454 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 9 00:40:21.818855 kubelet[1454]: I0909 00:40:21.818456 1454 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 9 00:40:21.818855 kubelet[1454]: I0909 00:40:21.818525 1454 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 9 00:40:21.818855 kubelet[1454]: I0909 00:40:21.818799 1454 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 9 00:40:21.820036 kubelet[1454]: E0909 00:40:21.820016 1454 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 9 00:40:21.820526 kubelet[1454]: E0909 00:40:21.820502 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.107\" not found" Sep 9 00:40:21.820656 kubelet[1454]: I0909 00:40:21.820642 1454 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 9 00:40:21.821000 kubelet[1454]: I0909 00:40:21.820981 1454 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 9 00:40:21.821130 kubelet[1454]: I0909 00:40:21.821119 1454 reconciler.go:26] "Reconciler: start to sync state" Sep 9 00:40:21.822059 kubelet[1454]: I0909 00:40:21.822011 1454 factory.go:221] Registration of the systemd container factory successfully Sep 9 00:40:21.822284 kubelet[1454]: I0909 00:40:21.822258 1454 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 9 00:40:21.823712 kubelet[1454]: I0909 00:40:21.823690 1454 factory.go:221] Registration of the containerd container factory successfully Sep 9 00:40:21.832068 kubelet[1454]: E0909 00:40:21.832037 1454 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.107\" not found" node="10.0.0.107" Sep 9 00:40:21.837641 kubelet[1454]: I0909 00:40:21.837620 1454 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 9 00:40:21.837742 kubelet[1454]: I0909 00:40:21.837729 1454 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 9 00:40:21.837805 kubelet[1454]: I0909 00:40:21.837795 1454 state_mem.go:36] "Initialized new in-memory state store" Sep 9 00:40:21.841000 audit[1469]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.841000 audit[1469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8933a50 a2=0 a3=1 items=0 ppid=1454 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 9 00:40:21.842000 audit[1475]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.842000 audit[1475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc5c552a0 a2=0 a3=1 items=0 ppid=1454 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 9 00:40:21.911575 kubelet[1454]: I0909 00:40:21.911545 1454 policy_none.go:49] "None policy: Start" Sep 9 00:40:21.911745 kubelet[1454]: I0909 00:40:21.911732 1454 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 9 00:40:21.911840 kubelet[1454]: I0909 00:40:21.911830 1454 state_mem.go:35] "Initializing new in-memory state store" Sep 9 00:40:21.844000 audit[1477]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.844000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe19de490 a2=0 a3=1 items=0 ppid=1454 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:40:21.916561 systemd[1]: Created slice kubepods.slice. Sep 9 00:40:21.915000 audit[1482]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.915000 audit[1482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff5d3a640 a2=0 a3=1 items=0 ppid=1454 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:40:21.920737 systemd[1]: Created slice kubepods-burstable.slice. Sep 9 00:40:21.920832 kubelet[1454]: E0909 00:40:21.920811 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.107\" not found" Sep 9 00:40:21.923428 systemd[1]: Created slice kubepods-besteffort.slice. Sep 9 00:40:21.931226 kubelet[1454]: I0909 00:40:21.931197 1454 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 9 00:40:21.930000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:21.930000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 9 00:40:21.930000 audit[1454]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000614930 a1=4000daf4e8 a2=4000614900 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.930000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 9 00:40:21.931463 kubelet[1454]: I0909 00:40:21.931256 1454 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 9 00:40:21.931463 kubelet[1454]: I0909 00:40:21.931363 1454 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 9 00:40:21.931463 kubelet[1454]: I0909 00:40:21.931375 1454 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 9 00:40:21.932418 kubelet[1454]: E0909 00:40:21.932398 1454 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 9 00:40:21.932536 kubelet[1454]: E0909 00:40:21.932521 1454 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.107\" not found" Sep 9 00:40:21.932588 kubelet[1454]: I0909 00:40:21.932440 1454 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 9 00:40:21.948000 audit[1487]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.948000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd2a734a0 a2=0 a3=1 items=0 ppid=1454 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 9 00:40:21.950202 kubelet[1454]: I0909 00:40:21.950154 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 9 00:40:21.949000 audit[1488]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:21.949000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc7cb9720 a2=0 a3=1 items=0 ppid=1454 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 9 00:40:21.949000 audit[1489]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.949000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccb56b90 a2=0 a3=1 items=0 ppid=1454 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 9 00:40:21.951819 kubelet[1454]: I0909 00:40:21.951796 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 9 00:40:21.951819 kubelet[1454]: I0909 00:40:21.951822 1454 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 9 00:40:21.951912 kubelet[1454]: I0909 00:40:21.951845 1454 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 9 00:40:21.951912 kubelet[1454]: I0909 00:40:21.951852 1454 kubelet.go:2382] "Starting kubelet main sync loop" Sep 9 00:40:21.951991 kubelet[1454]: E0909 00:40:21.951974 1454 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 9 00:40:21.951000 audit[1491]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:21.951000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2a860d0 a2=0 a3=1 items=0 ppid=1454 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 9 00:40:21.951000 audit[1490]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.951000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff2c9c130 a2=0 a3=1 items=0 ppid=1454 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 9 00:40:21.952000 audit[1493]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:21.952000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff1cd7620 a2=0 a3=1 items=0 ppid=1454 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 9 00:40:21.952000 audit[1494]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:21.952000 audit[1494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe514a940 a2=0 a3=1 items=0 ppid=1454 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 9 00:40:21.953000 audit[1495]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:21.953000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffc98a6b0 a2=0 a3=1 items=0 ppid=1454 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:21.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 9 00:40:22.032912 kubelet[1454]: I0909 00:40:22.032828 1454 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.107" Sep 9 00:40:22.040002 kubelet[1454]: I0909 00:40:22.039966 1454 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.107" Sep 9 00:40:22.150315 kubelet[1454]: I0909 00:40:22.150282 1454 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 9 00:40:22.150737 env[1213]: time="2025-09-09T00:40:22.150623634Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 9 00:40:22.151017 kubelet[1454]: I0909 00:40:22.150785 1454 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 9 00:40:22.164000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:22.164000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:40:22.165650 sudo[1349]: pam_unix(sudo:session): session closed for user root Sep 9 00:40:22.167221 sshd[1345]: pam_unix(sshd:session): session closed for user core Sep 9 00:40:22.166000 audit[1345]: USER_END pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:22.166000 audit[1345]: CRED_DISP pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:40:22.169770 systemd[1]: sshd@6-10.0.0.107:22-10.0.0.1:33654.service: Deactivated successfully. Sep 9 00:40:22.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.107:22-10.0.0.1:33654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:40:22.170494 systemd[1]: session-7.scope: Deactivated successfully. Sep 9 00:40:22.170989 systemd-logind[1204]: Session 7 logged out. Waiting for processes to exit. Sep 9 00:40:22.171833 systemd-logind[1204]: Removed session 7. Sep 9 00:40:22.754409 kubelet[1454]: I0909 00:40:22.754367 1454 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 9 00:40:22.754817 kubelet[1454]: W0909 00:40:22.754587 1454 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 9 00:40:22.754817 kubelet[1454]: W0909 00:40:22.754587 1454 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 9 00:40:22.754817 kubelet[1454]: W0909 00:40:22.754595 1454 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 9 00:40:22.800479 kubelet[1454]: I0909 00:40:22.800429 1454 apiserver.go:52] "Watching apiserver" Sep 9 00:40:22.801545 kubelet[1454]: E0909 00:40:22.801517 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:22.805264 kubelet[1454]: E0909 00:40:22.805218 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k2ltc" podUID="c3f1badc-b122-486a-b16d-d9c6ae06ee16" Sep 9 00:40:22.809652 systemd[1]: Created slice kubepods-besteffort-podcf0c951b_9eea_4d2c_aeb6_c2d6cff35afe.slice. Sep 9 00:40:22.820179 systemd[1]: Created slice kubepods-besteffort-podb5e41326_d677_4184_b26b_c238a88c90c7.slice. Sep 9 00:40:22.821494 kubelet[1454]: I0909 00:40:22.821460 1454 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 9 00:40:22.827621 kubelet[1454]: I0909 00:40:22.827598 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-cni-log-dir\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827696 kubelet[1454]: I0909 00:40:22.827633 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-var-lib-calico\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827696 kubelet[1454]: I0909 00:40:22.827650 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-xtables-lock\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827696 kubelet[1454]: I0909 00:40:22.827666 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c3f1badc-b122-486a-b16d-d9c6ae06ee16-varrun\") pod \"csi-node-driver-k2ltc\" (UID: \"c3f1badc-b122-486a-b16d-d9c6ae06ee16\") " pod="calico-system/csi-node-driver-k2ltc" Sep 9 00:40:22.827696 kubelet[1454]: I0909 00:40:22.827683 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c3f1badc-b122-486a-b16d-d9c6ae06ee16-registration-dir\") pod \"csi-node-driver-k2ltc\" (UID: \"c3f1badc-b122-486a-b16d-d9c6ae06ee16\") " pod="calico-system/csi-node-driver-k2ltc" Sep 9 00:40:22.827793 kubelet[1454]: I0909 00:40:22.827702 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe-lib-modules\") pod \"kube-proxy-vkltd\" (UID: \"cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe\") " pod="kube-system/kube-proxy-vkltd" Sep 9 00:40:22.827793 kubelet[1454]: I0909 00:40:22.827736 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-lib-modules\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827793 kubelet[1454]: I0909 00:40:22.827776 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b5e41326-d677-4184-b26b-c238a88c90c7-node-certs\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827793 kubelet[1454]: I0909 00:40:22.827791 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-policysync\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827889 kubelet[1454]: I0909 00:40:22.827807 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5e41326-d677-4184-b26b-c238a88c90c7-tigera-ca-bundle\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827889 kubelet[1454]: I0909 00:40:22.827823 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jrp7l\" (UniqueName: \"kubernetes.io/projected/b5e41326-d677-4184-b26b-c238a88c90c7-kube-api-access-jrp7l\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827889 kubelet[1454]: I0909 00:40:22.827850 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-cni-net-dir\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827889 kubelet[1454]: I0909 00:40:22.827865 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-flexvol-driver-host\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.827976 kubelet[1454]: I0909 00:40:22.827899 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe-kube-proxy\") pod \"kube-proxy-vkltd\" (UID: \"cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe\") " pod="kube-system/kube-proxy-vkltd" Sep 9 00:40:22.827976 kubelet[1454]: I0909 00:40:22.827922 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe-xtables-lock\") pod \"kube-proxy-vkltd\" (UID: \"cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe\") " pod="kube-system/kube-proxy-vkltd" Sep 9 00:40:22.827976 kubelet[1454]: I0909 00:40:22.827959 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w4nr7\" (UniqueName: \"kubernetes.io/projected/cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe-kube-api-access-w4nr7\") pod \"kube-proxy-vkltd\" (UID: \"cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe\") " pod="kube-system/kube-proxy-vkltd" Sep 9 00:40:22.827976 kubelet[1454]: I0909 00:40:22.827975 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-cni-bin-dir\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.828055 kubelet[1454]: I0909 00:40:22.827991 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b5e41326-d677-4184-b26b-c238a88c90c7-var-run-calico\") pod \"calico-node-gt86t\" (UID: \"b5e41326-d677-4184-b26b-c238a88c90c7\") " pod="calico-system/calico-node-gt86t" Sep 9 00:40:22.828055 kubelet[1454]: I0909 00:40:22.828024 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c3f1badc-b122-486a-b16d-d9c6ae06ee16-kubelet-dir\") pod \"csi-node-driver-k2ltc\" (UID: \"c3f1badc-b122-486a-b16d-d9c6ae06ee16\") " pod="calico-system/csi-node-driver-k2ltc" Sep 9 00:40:22.828055 kubelet[1454]: I0909 00:40:22.828040 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c3f1badc-b122-486a-b16d-d9c6ae06ee16-socket-dir\") pod \"csi-node-driver-k2ltc\" (UID: \"c3f1badc-b122-486a-b16d-d9c6ae06ee16\") " pod="calico-system/csi-node-driver-k2ltc" Sep 9 00:40:22.828114 kubelet[1454]: I0909 00:40:22.828056 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w4hjd\" (UniqueName: \"kubernetes.io/projected/c3f1badc-b122-486a-b16d-d9c6ae06ee16-kube-api-access-w4hjd\") pod \"csi-node-driver-k2ltc\" (UID: \"c3f1badc-b122-486a-b16d-d9c6ae06ee16\") " pod="calico-system/csi-node-driver-k2ltc" Sep 9 00:40:22.929731 kubelet[1454]: I0909 00:40:22.929690 1454 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 9 00:40:22.930180 kubelet[1454]: E0909 00:40:22.930158 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.930180 kubelet[1454]: W0909 00:40:22.930175 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.930269 kubelet[1454]: E0909 00:40:22.930194 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.930454 kubelet[1454]: E0909 00:40:22.930439 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.930633 kubelet[1454]: W0909 00:40:22.930616 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.930665 kubelet[1454]: E0909 00:40:22.930637 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.930905 kubelet[1454]: E0909 00:40:22.930888 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.930905 kubelet[1454]: W0909 00:40:22.930899 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.930976 kubelet[1454]: E0909 00:40:22.930909 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.931115 kubelet[1454]: E0909 00:40:22.931090 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.931115 kubelet[1454]: W0909 00:40:22.931114 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.931171 kubelet[1454]: E0909 00:40:22.931123 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.931928 kubelet[1454]: E0909 00:40:22.931914 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.931928 kubelet[1454]: W0909 00:40:22.931927 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.932007 kubelet[1454]: E0909 00:40:22.931938 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.935727 kubelet[1454]: E0909 00:40:22.935711 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.935727 kubelet[1454]: W0909 00:40:22.935725 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.935821 kubelet[1454]: E0909 00:40:22.935737 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.941148 kubelet[1454]: E0909 00:40:22.941125 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.941148 kubelet[1454]: W0909 00:40:22.941141 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.941259 kubelet[1454]: E0909 00:40:22.941158 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.941377 kubelet[1454]: E0909 00:40:22.941361 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.941377 kubelet[1454]: W0909 00:40:22.941374 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.941451 kubelet[1454]: E0909 00:40:22.941383 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:22.944599 kubelet[1454]: E0909 00:40:22.944540 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:40:22.944741 kubelet[1454]: W0909 00:40:22.944723 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:40:22.944811 kubelet[1454]: E0909 00:40:22.944798 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:40:23.120627 kubelet[1454]: E0909 00:40:23.119913 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:40:23.120936 env[1213]: time="2025-09-09T00:40:23.120873253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vkltd,Uid:cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe,Namespace:kube-system,Attempt:0,}" Sep 9 00:40:23.123141 env[1213]: time="2025-09-09T00:40:23.123051585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gt86t,Uid:b5e41326-d677-4184-b26b-c238a88c90c7,Namespace:calico-system,Attempt:0,}" Sep 9 00:40:23.705709 env[1213]: time="2025-09-09T00:40:23.705654340Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.707552 env[1213]: time="2025-09-09T00:40:23.707516656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.708291 env[1213]: time="2025-09-09T00:40:23.708256190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.710180 env[1213]: time="2025-09-09T00:40:23.710143689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.711445 env[1213]: time="2025-09-09T00:40:23.711418134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.713762 env[1213]: time="2025-09-09T00:40:23.713730691Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.715091 env[1213]: time="2025-09-09T00:40:23.715062151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.716556 env[1213]: time="2025-09-09T00:40:23.716526863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:23.735711 env[1213]: time="2025-09-09T00:40:23.735583603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:40:23.735711 env[1213]: time="2025-09-09T00:40:23.735685265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:40:23.735711 env[1213]: time="2025-09-09T00:40:23.735697511Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:40:23.735711 env[1213]: time="2025-09-09T00:40:23.735657812Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:40:23.735711 env[1213]: time="2025-09-09T00:40:23.735693497Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:40:23.735711 env[1213]: time="2025-09-09T00:40:23.735703959Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:40:23.735927 env[1213]: time="2025-09-09T00:40:23.735893374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3455ee526f675106ad0e551595b984578a2baf2017e43560075a309d6d024276 pid=1528 runtime=io.containerd.runc.v2 Sep 9 00:40:23.735965 env[1213]: time="2025-09-09T00:40:23.735935710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f pid=1529 runtime=io.containerd.runc.v2 Sep 9 00:40:23.752363 systemd[1]: Started cri-containerd-3455ee526f675106ad0e551595b984578a2baf2017e43560075a309d6d024276.scope. Sep 9 00:40:23.758280 systemd[1]: Started cri-containerd-0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f.scope. Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit: BPF prog-id=61 op=LOAD Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1528 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353565653532366636373531303661643065353531353935623938 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1528 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353565653532366636373531303661643065353531353935623938 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.771000 audit: BPF prog-id=62 op=LOAD Sep 9 00:40:23.771000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1528 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353565653532366636373531303661643065353531353935623938 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit: BPF prog-id=63 op=LOAD Sep 9 00:40:23.772000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1528 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353565653532366636373531303661643065353531353935623938 Sep 9 00:40:23.772000 audit: BPF prog-id=63 op=UNLOAD Sep 9 00:40:23.772000 audit: BPF prog-id=62 op=UNLOAD Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { perfmon } for pid=1550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1550]: AVC avc: denied { bpf } for pid=1550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit: BPF prog-id=64 op=LOAD Sep 9 00:40:23.772000 audit[1550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1528 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353565653532366636373531303661643065353531353935623938 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit: BPF prog-id=65 op=LOAD Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1529 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333863616365363932303461373661353636646534373965383235 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333863616365363932303461373661353636646534373965383235 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit: BPF prog-id=66 op=LOAD Sep 9 00:40:23.773000 audit[1547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333863616365363932303461373661353636646534373965383235 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit: BPF prog-id=67 op=LOAD Sep 9 00:40:23.773000 audit[1547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333863616365363932303461373661353636646534373965383235 Sep 9 00:40:23.773000 audit: BPF prog-id=67 op=UNLOAD Sep 9 00:40:23.773000 audit: BPF prog-id=66 op=UNLOAD Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { perfmon } for pid=1547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit[1547]: AVC avc: denied { bpf } for pid=1547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:23.773000 audit: BPF prog-id=68 op=LOAD Sep 9 00:40:23.773000 audit[1547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:23.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333863616365363932303461373661353636646534373965383235 Sep 9 00:40:23.788672 env[1213]: time="2025-09-09T00:40:23.788620840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gt86t,Uid:b5e41326-d677-4184-b26b-c238a88c90c7,Namespace:calico-system,Attempt:0,} returns sandbox id \"0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f\"" Sep 9 00:40:23.788784 env[1213]: time="2025-09-09T00:40:23.788630612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vkltd,Uid:cf0c951b-9eea-4d2c-aeb6-c2d6cff35afe,Namespace:kube-system,Attempt:0,} returns sandbox id \"3455ee526f675106ad0e551595b984578a2baf2017e43560075a309d6d024276\"" Sep 9 00:40:23.790483 kubelet[1454]: E0909 00:40:23.789992 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:40:23.790993 env[1213]: time="2025-09-09T00:40:23.790963364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 9 00:40:23.801671 kubelet[1454]: E0909 00:40:23.801646 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:23.936058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1481139558.mount: Deactivated successfully. Sep 9 00:40:23.952676 kubelet[1454]: E0909 00:40:23.952580 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k2ltc" podUID="c3f1badc-b122-486a-b16d-d9c6ae06ee16" Sep 9 00:40:24.683272 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4023949906.mount: Deactivated successfully. Sep 9 00:40:24.781218 env[1213]: time="2025-09-09T00:40:24.781169240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:24.785979 env[1213]: time="2025-09-09T00:40:24.785934054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:24.787484 env[1213]: time="2025-09-09T00:40:24.787443924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:24.790483 env[1213]: time="2025-09-09T00:40:24.790450386Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:24.791215 env[1213]: time="2025-09-09T00:40:24.791174170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 9 00:40:24.792973 env[1213]: time="2025-09-09T00:40:24.792849816Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\"" Sep 9 00:40:24.794139 env[1213]: time="2025-09-09T00:40:24.794106712Z" level=info msg="CreateContainer within sandbox \"0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 9 00:40:24.801812 kubelet[1454]: E0909 00:40:24.801782 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:24.810652 env[1213]: time="2025-09-09T00:40:24.810611003Z" level=info msg="CreateContainer within sandbox \"0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"63bd1d7fb8e00422a87f3787bd69cedad0a471ede13302eac36c5008e969ac6a\"" Sep 9 00:40:24.811614 env[1213]: time="2025-09-09T00:40:24.811585575Z" level=info msg="StartContainer for \"63bd1d7fb8e00422a87f3787bd69cedad0a471ede13302eac36c5008e969ac6a\"" Sep 9 00:40:24.828577 systemd[1]: Started cri-containerd-63bd1d7fb8e00422a87f3787bd69cedad0a471ede13302eac36c5008e969ac6a.scope. Sep 9 00:40:24.856443 kernel: kauditd_printk_skb: 357 callbacks suppressed Sep 9 00:40:24.856556 kernel: audit: type=1400 audit(1757378424.853:453): avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1529 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:24.860875 kernel: audit: type=1300 audit(1757378424.853:453): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1529 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:24.860963 kernel: audit: type=1327 audit(1757378424.853:453): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626431643766623865303034323261383766333738376264363963 Sep 9 00:40:24.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626431643766623865303034323261383766333738376264363963 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.865902 kernel: audit: type=1400 audit(1757378424.853:454): avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.866037 kernel: audit: type=1400 audit(1757378424.853:454): avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.869994 kernel: audit: type=1400 audit(1757378424.853:454): avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.872442 kernel: audit: type=1400 audit(1757378424.853:454): avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.874795 kernel: audit: type=1400 audit(1757378424.853:454): avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.877147 kernel: audit: type=1400 audit(1757378424.853:454): avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.879885 kernel: audit: type=1400 audit(1757378424.853:454): avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.853000 audit: BPF prog-id=69 op=LOAD Sep 9 00:40:24.853000 audit[1605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1529 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:24.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626431643766623865303034323261383766333738376264363963 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.854000 audit: BPF prog-id=70 op=LOAD Sep 9 00:40:24.854000 audit[1605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1529 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:24.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626431643766623865303034323261383766333738376264363963 Sep 9 00:40:24.856000 audit: BPF prog-id=70 op=UNLOAD Sep 9 00:40:24.856000 audit: BPF prog-id=69 op=UNLOAD Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { perfmon } for pid=1605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit[1605]: AVC avc: denied { bpf } for pid=1605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:24.856000 audit: BPF prog-id=71 op=LOAD Sep 9 00:40:24.856000 audit[1605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1529 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:24.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626431643766623865303034323261383766333738376264363963 Sep 9 00:40:24.885000 env[1213]: time="2025-09-09T00:40:24.884950569Z" level=info msg="StartContainer for \"63bd1d7fb8e00422a87f3787bd69cedad0a471ede13302eac36c5008e969ac6a\" returns successfully" Sep 9 00:40:24.895865 systemd[1]: cri-containerd-63bd1d7fb8e00422a87f3787bd69cedad0a471ede13302eac36c5008e969ac6a.scope: Deactivated successfully. Sep 9 00:40:24.899000 audit: BPF prog-id=71 op=UNLOAD Sep 9 00:40:24.942107 env[1213]: time="2025-09-09T00:40:24.942004778Z" level=info msg="shim disconnected" id=63bd1d7fb8e00422a87f3787bd69cedad0a471ede13302eac36c5008e969ac6a Sep 9 00:40:24.942107 env[1213]: time="2025-09-09T00:40:24.942049308Z" level=warning msg="cleaning up after shim disconnected" id=63bd1d7fb8e00422a87f3787bd69cedad0a471ede13302eac36c5008e969ac6a namespace=k8s.io Sep 9 00:40:24.942107 env[1213]: time="2025-09-09T00:40:24.942059307Z" level=info msg="cleaning up dead shim" Sep 9 00:40:24.950475 env[1213]: time="2025-09-09T00:40:24.950438588Z" level=warning msg="cleanup warnings time=\"2025-09-09T00:40:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1646 runtime=io.containerd.runc.v2\n" Sep 9 00:40:25.802194 kubelet[1454]: E0909 00:40:25.802113 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:25.953820 kubelet[1454]: E0909 00:40:25.953685 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k2ltc" podUID="c3f1badc-b122-486a-b16d-d9c6ae06ee16" Sep 9 00:40:25.968698 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1987110159.mount: Deactivated successfully. Sep 9 00:40:26.456996 env[1213]: time="2025-09-09T00:40:26.456934668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:26.461379 env[1213]: time="2025-09-09T00:40:26.461338191Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2cf30e39f99f8f4ee1a736a4f3175cc2d8d3f58936d8fa83ec5523658fdc7b8b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:26.464471 env[1213]: time="2025-09-09T00:40:26.464440290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:26.467162 env[1213]: time="2025-09-09T00:40:26.467110355Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:adc1335b480ddd833aac3b0bd20f68ff0f3c3cf7a0bd337933b006d9f5cec40a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:26.467492 env[1213]: time="2025-09-09T00:40:26.467377035Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\" returns image reference \"sha256:2cf30e39f99f8f4ee1a736a4f3175cc2d8d3f58936d8fa83ec5523658fdc7b8b\"" Sep 9 00:40:26.468782 env[1213]: time="2025-09-09T00:40:26.468746725Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 9 00:40:26.469681 env[1213]: time="2025-09-09T00:40:26.469652047Z" level=info msg="CreateContainer within sandbox \"3455ee526f675106ad0e551595b984578a2baf2017e43560075a309d6d024276\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 9 00:40:26.497542 env[1213]: time="2025-09-09T00:40:26.497493462Z" level=info msg="CreateContainer within sandbox \"3455ee526f675106ad0e551595b984578a2baf2017e43560075a309d6d024276\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c95ef0a0a7bdf309cd8c3955a153316e1b01d2f60e303fb02f40847462581328\"" Sep 9 00:40:26.498019 env[1213]: time="2025-09-09T00:40:26.497980356Z" level=info msg="StartContainer for \"c95ef0a0a7bdf309cd8c3955a153316e1b01d2f60e303fb02f40847462581328\"" Sep 9 00:40:26.512840 systemd[1]: Started cri-containerd-c95ef0a0a7bdf309cd8c3955a153316e1b01d2f60e303fb02f40847462581328.scope. Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1528 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339356566306130613762646633303963643863333935356131353333 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit: BPF prog-id=72 op=LOAD Sep 9 00:40:26.531000 audit[1671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1528 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339356566306130613762646633303963643863333935356131353333 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit: BPF prog-id=73 op=LOAD Sep 9 00:40:26.531000 audit[1671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1528 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339356566306130613762646633303963643863333935356131353333 Sep 9 00:40:26.531000 audit: BPF prog-id=73 op=UNLOAD Sep 9 00:40:26.531000 audit: BPF prog-id=72 op=UNLOAD Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { perfmon } for pid=1671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit[1671]: AVC avc: denied { bpf } for pid=1671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:26.531000 audit: BPF prog-id=74 op=LOAD Sep 9 00:40:26.531000 audit[1671]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1528 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339356566306130613762646633303963643863333935356131353333 Sep 9 00:40:26.547924 env[1213]: time="2025-09-09T00:40:26.547881698Z" level=info msg="StartContainer for \"c95ef0a0a7bdf309cd8c3955a153316e1b01d2f60e303fb02f40847462581328\" returns successfully" Sep 9 00:40:26.681000 audit[1732]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.681000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc3e6dda0 a2=0 a3=1 items=0 ppid=1682 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 9 00:40:26.682000 audit[1733]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.682000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeadc5b60 a2=0 a3=1 items=0 ppid=1682 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 9 00:40:26.682000 audit[1734]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.682000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe14e8ea0 a2=0 a3=1 items=0 ppid=1682 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 9 00:40:26.684000 audit[1737]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.684000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff22809f0 a2=0 a3=1 items=0 ppid=1682 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 9 00:40:26.684000 audit[1736]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.684000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0684fc0 a2=0 a3=1 items=0 ppid=1682 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 9 00:40:26.685000 audit[1738]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.685000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd50454e0 a2=0 a3=1 items=0 ppid=1682 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 9 00:40:26.784000 audit[1739]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.784000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc0208830 a2=0 a3=1 items=0 ppid=1682 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 9 00:40:26.787000 audit[1741]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.787000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc8230ca0 a2=0 a3=1 items=0 ppid=1682 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 9 00:40:26.790000 audit[1744]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.790000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffc4e1d40 a2=0 a3=1 items=0 ppid=1682 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 9 00:40:26.791000 audit[1745]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.791000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff16dd750 a2=0 a3=1 items=0 ppid=1682 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 9 00:40:26.793000 audit[1747]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.793000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff199fc20 a2=0 a3=1 items=0 ppid=1682 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 9 00:40:26.794000 audit[1748]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.794000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6fe6b40 a2=0 a3=1 items=0 ppid=1682 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 9 00:40:26.796000 audit[1750]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.796000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcbab0c60 a2=0 a3=1 items=0 ppid=1682 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 9 00:40:26.799000 audit[1753]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.799000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4fef750 a2=0 a3=1 items=0 ppid=1682 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 9 00:40:26.800000 audit[1754]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.800000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc35c440 a2=0 a3=1 items=0 ppid=1682 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 9 00:40:26.802000 audit[1756]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.802000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd46b1f80 a2=0 a3=1 items=0 ppid=1682 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 9 00:40:26.803274 kubelet[1454]: E0909 00:40:26.803236 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:26.803000 audit[1757]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.803000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5eae860 a2=0 a3=1 items=0 ppid=1682 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 9 00:40:26.805000 audit[1759]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.805000 audit[1759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffcc09db0 a2=0 a3=1 items=0 ppid=1682 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 9 00:40:26.808000 audit[1762]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.808000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd8eedf00 a2=0 a3=1 items=0 ppid=1682 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 9 00:40:26.811000 audit[1765]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.811000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed9a7b10 a2=0 a3=1 items=0 ppid=1682 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 9 00:40:26.812000 audit[1766]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.812000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe316d750 a2=0 a3=1 items=0 ppid=1682 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.812000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 9 00:40:26.814000 audit[1768]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.814000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffca7e26e0 a2=0 a3=1 items=0 ppid=1682 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:40:26.837000 audit[1772]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.837000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffd99d0d0 a2=0 a3=1 items=0 ppid=1682 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:40:26.838000 audit[1773]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.838000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcaed4fb0 a2=0 a3=1 items=0 ppid=1682 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 9 00:40:26.840000 audit[1775]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:40:26.840000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffeafbdec0 a2=0 a3=1 items=0 ppid=1682 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 9 00:40:26.860000 audit[1781]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:26.860000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffdf209f10 a2=0 a3=1 items=0 ppid=1682 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:26.890000 audit[1781]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:26.890000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29052 a0=3 a1=ffffdf209f10 a2=0 a3=1 items=0 ppid=1682 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.890000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:26.900000 audit[1790]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.900000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd36a87e0 a2=0 a3=1 items=0 ppid=1682 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 9 00:40:26.902000 audit[1792]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.902000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffea39e990 a2=0 a3=1 items=0 ppid=1682 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 9 00:40:26.905000 audit[1795]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.905000 audit[1795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcd61ee40 a2=0 a3=1 items=0 ppid=1682 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 9 00:40:26.906000 audit[1796]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.906000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe443f30 a2=0 a3=1 items=0 ppid=1682 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 9 00:40:26.908000 audit[1798]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.908000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffe597690 a2=0 a3=1 items=0 ppid=1682 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 9 00:40:26.909000 audit[1799]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.909000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8a13b70 a2=0 a3=1 items=0 ppid=1682 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 9 00:40:26.912000 audit[1801]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.912000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffea9baf50 a2=0 a3=1 items=0 ppid=1682 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 9 00:40:26.915000 audit[1804]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.915000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff1bd99e0 a2=0 a3=1 items=0 ppid=1682 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 9 00:40:26.916000 audit[1805]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.916000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef8333c0 a2=0 a3=1 items=0 ppid=1682 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 9 00:40:26.918000 audit[1807]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.918000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc0b6cfe0 a2=0 a3=1 items=0 ppid=1682 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 9 00:40:26.920000 audit[1808]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.920000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5015850 a2=0 a3=1 items=0 ppid=1682 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 9 00:40:26.924000 audit[1810]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.924000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2660b50 a2=0 a3=1 items=0 ppid=1682 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 9 00:40:26.927000 audit[1813]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.927000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd254b460 a2=0 a3=1 items=0 ppid=1682 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 9 00:40:26.930000 audit[1816]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.930000 audit[1816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7d917d0 a2=0 a3=1 items=0 ppid=1682 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 9 00:40:26.931000 audit[1817]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.931000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffface9440 a2=0 a3=1 items=0 ppid=1682 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.931000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 9 00:40:26.933000 audit[1819]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.933000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe2695730 a2=0 a3=1 items=0 ppid=1682 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:40:26.936000 audit[1822]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.936000 audit[1822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff7864240 a2=0 a3=1 items=0 ppid=1682 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:40:26.938000 audit[1823]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.938000 audit[1823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea4fe6e0 a2=0 a3=1 items=0 ppid=1682 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 9 00:40:26.940000 audit[1825]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.940000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd87d67b0 a2=0 a3=1 items=0 ppid=1682 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 9 00:40:26.940000 audit[1826]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.940000 audit[1826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffceeed360 a2=0 a3=1 items=0 ppid=1682 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 9 00:40:26.942000 audit[1828]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.942000 audit[1828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffbaae940 a2=0 a3=1 items=0 ppid=1682 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:40:26.945000 audit[1831]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:40:26.945000 audit[1831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff0ee9740 a2=0 a3=1 items=0 ppid=1682 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:40:26.952000 audit[1833]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 9 00:40:26.952000 audit[1833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffebcac5f0 a2=0 a3=1 items=0 ppid=1682 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.952000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:26.952000 audit[1833]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 9 00:40:26.952000 audit[1833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffebcac5f0 a2=0 a3=1 items=0 ppid=1682 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:26.952000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:26.966054 kubelet[1454]: E0909 00:40:26.966026 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:40:26.976512 kubelet[1454]: I0909 00:40:26.976342 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-vkltd" podStartSLOduration=2.2985961169999998 podStartE2EDuration="4.976326744s" podCreationTimestamp="2025-09-09 00:40:22 +0000 UTC" firstStartedPulling="2025-09-09 00:40:23.79061511 +0000 UTC m=+3.154276248" lastFinishedPulling="2025-09-09 00:40:26.468345696 +0000 UTC m=+5.832006875" observedRunningTime="2025-09-09 00:40:26.976269824 +0000 UTC m=+6.339931002" watchObservedRunningTime="2025-09-09 00:40:26.976326744 +0000 UTC m=+6.339987923" Sep 9 00:40:27.804270 kubelet[1454]: E0909 00:40:27.804218 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:27.952778 kubelet[1454]: E0909 00:40:27.952727 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k2ltc" podUID="c3f1badc-b122-486a-b16d-d9c6ae06ee16" Sep 9 00:40:27.968545 kubelet[1454]: E0909 00:40:27.968518 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:40:28.795246 env[1213]: time="2025-09-09T00:40:28.795187016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:28.796867 env[1213]: time="2025-09-09T00:40:28.796823704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:28.799162 env[1213]: time="2025-09-09T00:40:28.799111039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:28.800735 env[1213]: time="2025-09-09T00:40:28.800707524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:28.801284 env[1213]: time="2025-09-09T00:40:28.801259358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 9 00:40:28.803221 env[1213]: time="2025-09-09T00:40:28.803165215Z" level=info msg="CreateContainer within sandbox \"0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 9 00:40:28.804462 kubelet[1454]: E0909 00:40:28.804432 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:28.814342 env[1213]: time="2025-09-09T00:40:28.814278258Z" level=info msg="CreateContainer within sandbox \"0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609\"" Sep 9 00:40:28.814722 env[1213]: time="2025-09-09T00:40:28.814698649Z" level=info msg="StartContainer for \"bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609\"" Sep 9 00:40:28.834248 systemd[1]: Started cri-containerd-bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609.scope. Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:28.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363362306165363734353031646264333834376138326232643331 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit: BPF prog-id=75 op=LOAD Sep 9 00:40:28.850000 audit[1842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:28.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363362306165363734353031646264333834376138326232643331 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit: BPF prog-id=76 op=LOAD Sep 9 00:40:28.850000 audit[1842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:28.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363362306165363734353031646264333834376138326232643331 Sep 9 00:40:28.850000 audit: BPF prog-id=76 op=UNLOAD Sep 9 00:40:28.850000 audit: BPF prog-id=75 op=UNLOAD Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:28.850000 audit: BPF prog-id=77 op=LOAD Sep 9 00:40:28.850000 audit[1842]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:28.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363362306165363734353031646264333834376138326232643331 Sep 9 00:40:28.869450 env[1213]: time="2025-09-09T00:40:28.869371278Z" level=info msg="StartContainer for \"bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609\" returns successfully" Sep 9 00:40:29.419670 env[1213]: time="2025-09-09T00:40:29.419610731Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 9 00:40:29.421816 systemd[1]: cri-containerd-bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609.scope: Deactivated successfully. Sep 9 00:40:29.432000 audit: BPF prog-id=77 op=UNLOAD Sep 9 00:40:29.497435 kubelet[1454]: I0909 00:40:29.497240 1454 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 9 00:40:29.588026 env[1213]: time="2025-09-09T00:40:29.587975559Z" level=info msg="shim disconnected" id=bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609 Sep 9 00:40:29.588026 env[1213]: time="2025-09-09T00:40:29.588022487Z" level=warning msg="cleaning up after shim disconnected" id=bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609 namespace=k8s.io Sep 9 00:40:29.588026 env[1213]: time="2025-09-09T00:40:29.588031905Z" level=info msg="cleaning up dead shim" Sep 9 00:40:29.595008 env[1213]: time="2025-09-09T00:40:29.594964440Z" level=warning msg="cleanup warnings time=\"2025-09-09T00:40:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1882 runtime=io.containerd.runc.v2\n" Sep 9 00:40:29.805060 kubelet[1454]: E0909 00:40:29.804909 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:29.810930 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bd63b0ae674501dbd3847a82b2d314b172e60d0392117a4ac2e7b8c0dfcfc609-rootfs.mount: Deactivated successfully. Sep 9 00:40:29.958111 systemd[1]: Created slice kubepods-besteffort-podc3f1badc_b122_486a_b16d_d9c6ae06ee16.slice. Sep 9 00:40:29.960281 env[1213]: time="2025-09-09T00:40:29.960243229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k2ltc,Uid:c3f1badc-b122-486a-b16d-d9c6ae06ee16,Namespace:calico-system,Attempt:0,}" Sep 9 00:40:29.976035 env[1213]: time="2025-09-09T00:40:29.976001818Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 9 00:40:30.030375 env[1213]: time="2025-09-09T00:40:30.030308064Z" level=error msg="Failed to destroy network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:30.031873 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced-shm.mount: Deactivated successfully. Sep 9 00:40:30.032268 env[1213]: time="2025-09-09T00:40:30.032229447Z" level=error msg="encountered an error cleaning up failed sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:30.032414 env[1213]: time="2025-09-09T00:40:30.032369521Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k2ltc,Uid:c3f1badc-b122-486a-b16d-d9c6ae06ee16,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:30.032723 kubelet[1454]: E0909 00:40:30.032664 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:30.032800 kubelet[1454]: E0909 00:40:30.032742 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k2ltc" Sep 9 00:40:30.032800 kubelet[1454]: E0909 00:40:30.032762 1454 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k2ltc" Sep 9 00:40:30.032856 kubelet[1454]: E0909 00:40:30.032799 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-k2ltc_calico-system(c3f1badc-b122-486a-b16d-d9c6ae06ee16)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-k2ltc_calico-system(c3f1badc-b122-486a-b16d-d9c6ae06ee16)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k2ltc" podUID="c3f1badc-b122-486a-b16d-d9c6ae06ee16" Sep 9 00:40:30.805502 kubelet[1454]: E0909 00:40:30.805440 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:30.978022 kubelet[1454]: I0909 00:40:30.977836 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Sep 9 00:40:30.978668 env[1213]: time="2025-09-09T00:40:30.978632032Z" level=info msg="StopPodSandbox for \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\"" Sep 9 00:40:30.999461 env[1213]: time="2025-09-09T00:40:30.999403280Z" level=error msg="StopPodSandbox for \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\" failed" error="failed to destroy network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:30.999856 kubelet[1454]: E0909 00:40:30.999791 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Sep 9 00:40:30.999942 kubelet[1454]: E0909 00:40:30.999879 1454 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced"} Sep 9 00:40:30.999980 kubelet[1454]: E0909 00:40:30.999952 1454 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c3f1badc-b122-486a-b16d-d9c6ae06ee16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 9 00:40:31.000038 kubelet[1454]: E0909 00:40:30.999977 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c3f1badc-b122-486a-b16d-d9c6ae06ee16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k2ltc" podUID="c3f1badc-b122-486a-b16d-d9c6ae06ee16" Sep 9 00:40:31.806080 kubelet[1454]: E0909 00:40:31.806025 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:32.806271 kubelet[1454]: E0909 00:40:32.806218 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:33.485223 systemd[1]: Created slice kubepods-besteffort-pod02b2b8c9_9d21_4468_99ee_b12c80fc814a.slice. Sep 9 00:40:33.500508 kubelet[1454]: I0909 00:40:33.500474 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rc5ns\" (UniqueName: \"kubernetes.io/projected/02b2b8c9-9d21-4468-99ee-b12c80fc814a-kube-api-access-rc5ns\") pod \"nginx-deployment-7fcdb87857-x64dq\" (UID: \"02b2b8c9-9d21-4468-99ee-b12c80fc814a\") " pod="default/nginx-deployment-7fcdb87857-x64dq" Sep 9 00:40:33.793919 env[1213]: time="2025-09-09T00:40:33.793676935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x64dq,Uid:02b2b8c9-9d21-4468-99ee-b12c80fc814a,Namespace:default,Attempt:0,}" Sep 9 00:40:33.809116 kubelet[1454]: E0909 00:40:33.809078 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:33.846685 env[1213]: time="2025-09-09T00:40:33.846617783Z" level=error msg="Failed to destroy network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:33.847007 env[1213]: time="2025-09-09T00:40:33.846970297Z" level=error msg="encountered an error cleaning up failed sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:33.847069 env[1213]: time="2025-09-09T00:40:33.847020919Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x64dq,Uid:02b2b8c9-9d21-4468-99ee-b12c80fc814a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:33.848095 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff-shm.mount: Deactivated successfully. Sep 9 00:40:33.848819 kubelet[1454]: E0909 00:40:33.848778 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:33.848893 kubelet[1454]: E0909 00:40:33.848841 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-x64dq" Sep 9 00:40:33.848893 kubelet[1454]: E0909 00:40:33.848862 1454 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-x64dq" Sep 9 00:40:33.848993 kubelet[1454]: E0909 00:40:33.848899 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-x64dq_default(02b2b8c9-9d21-4468-99ee-b12c80fc814a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-x64dq_default(02b2b8c9-9d21-4468-99ee-b12c80fc814a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-x64dq" podUID="02b2b8c9-9d21-4468-99ee-b12c80fc814a" Sep 9 00:40:33.986033 kubelet[1454]: I0909 00:40:33.985993 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Sep 9 00:40:33.986659 env[1213]: time="2025-09-09T00:40:33.986616847Z" level=info msg="StopPodSandbox for \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\"" Sep 9 00:40:34.008360 env[1213]: time="2025-09-09T00:40:34.008293048Z" level=error msg="StopPodSandbox for \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\" failed" error="failed to destroy network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:40:34.008527 kubelet[1454]: E0909 00:40:34.008491 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Sep 9 00:40:34.008574 kubelet[1454]: E0909 00:40:34.008535 1454 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff"} Sep 9 00:40:34.008574 kubelet[1454]: E0909 00:40:34.008569 1454 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"02b2b8c9-9d21-4468-99ee-b12c80fc814a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 9 00:40:34.008661 kubelet[1454]: E0909 00:40:34.008590 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"02b2b8c9-9d21-4468-99ee-b12c80fc814a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-x64dq" podUID="02b2b8c9-9d21-4468-99ee-b12c80fc814a" Sep 9 00:40:34.809790 kubelet[1454]: E0909 00:40:34.809734 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:35.810301 kubelet[1454]: E0909 00:40:35.810255 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:36.348253 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1601631198.mount: Deactivated successfully. Sep 9 00:40:36.654952 env[1213]: time="2025-09-09T00:40:36.654653403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:36.664810 env[1213]: time="2025-09-09T00:40:36.664776090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:36.667681 env[1213]: time="2025-09-09T00:40:36.667652780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:36.669689 env[1213]: time="2025-09-09T00:40:36.669661888Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:36.670067 env[1213]: time="2025-09-09T00:40:36.670031784Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 9 00:40:36.679291 env[1213]: time="2025-09-09T00:40:36.679258380Z" level=info msg="CreateContainer within sandbox \"0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 9 00:40:36.690043 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3522059980.mount: Deactivated successfully. Sep 9 00:40:36.693980 env[1213]: time="2025-09-09T00:40:36.693930169Z" level=info msg="CreateContainer within sandbox \"0738cace69204a76a566de479e8251fc2020f5d6981573975559411e72556c0f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5bdb993589ba0aee9b9165ec3faf188ffd0fefe9d63fb209fa3cc677d23f75c2\"" Sep 9 00:40:36.694666 env[1213]: time="2025-09-09T00:40:36.694635679Z" level=info msg="StartContainer for \"5bdb993589ba0aee9b9165ec3faf188ffd0fefe9d63fb209fa3cc677d23f75c2\"" Sep 9 00:40:36.709635 systemd[1]: Started cri-containerd-5bdb993589ba0aee9b9165ec3faf188ffd0fefe9d63fb209fa3cc677d23f75c2.scope. Sep 9 00:40:36.727000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.729810 kernel: kauditd_printk_skb: 274 callbacks suppressed Sep 9 00:40:36.729860 kernel: audit: type=1400 audit(1757378436.727:524): avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.727000 audit[2007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:36.734537 kernel: audit: type=1300 audit(1757378436.727:524): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1529 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:36.734590 kernel: audit: type=1327 audit(1757378436.727:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646239393335383962613061656539623931363565633366616631 Sep 9 00:40:36.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646239393335383962613061656539623931363565633366616631 Sep 9 00:40:36.737258 kernel: audit: type=1400 audit(1757378436.728:525): avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.740842 kernel: audit: type=1400 audit(1757378436.728:525): avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.740874 kernel: audit: type=1400 audit(1757378436.728:525): avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.744580 kernel: audit: type=1400 audit(1757378436.728:525): avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.744647 kernel: audit: type=1400 audit(1757378436.728:525): avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.746380 kernel: audit: type=1400 audit(1757378436.728:525): avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.748292 kernel: audit: type=1400 audit(1757378436.728:525): avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit: BPF prog-id=78 op=LOAD Sep 9 00:40:36.728000 audit[2007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1529 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:36.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646239393335383962613061656539623931363565633366616631 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.728000 audit: BPF prog-id=79 op=LOAD Sep 9 00:40:36.728000 audit[2007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1529 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:36.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646239393335383962613061656539623931363565633366616631 Sep 9 00:40:36.730000 audit: BPF prog-id=79 op=UNLOAD Sep 9 00:40:36.730000 audit: BPF prog-id=78 op=UNLOAD Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:36.730000 audit: BPF prog-id=80 op=LOAD Sep 9 00:40:36.730000 audit[2007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1529 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:36.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646239393335383962613061656539623931363565633366616631 Sep 9 00:40:36.756010 env[1213]: time="2025-09-09T00:40:36.755963354Z" level=info msg="StartContainer for \"5bdb993589ba0aee9b9165ec3faf188ffd0fefe9d63fb209fa3cc677d23f75c2\" returns successfully" Sep 9 00:40:36.811191 kubelet[1454]: E0909 00:40:36.811138 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:36.875998 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 9 00:40:36.876105 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 9 00:40:37.006603 kubelet[1454]: I0909 00:40:37.006473 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-gt86t" podStartSLOduration=2.126009628 podStartE2EDuration="15.006446758s" podCreationTimestamp="2025-09-09 00:40:22 +0000 UTC" firstStartedPulling="2025-09-09 00:40:23.790502013 +0000 UTC m=+3.154163191" lastFinishedPulling="2025-09-09 00:40:36.670939143 +0000 UTC m=+16.034600321" observedRunningTime="2025-09-09 00:40:37.005840031 +0000 UTC m=+16.369501209" watchObservedRunningTime="2025-09-09 00:40:37.006446758 +0000 UTC m=+16.370107936" Sep 9 00:40:37.811961 kubelet[1454]: E0909 00:40:37.811685 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:38.007330 systemd[1]: run-containerd-runc-k8s.io-5bdb993589ba0aee9b9165ec3faf188ffd0fefe9d63fb209fa3cc677d23f75c2-runc.LkjxtK.mount: Deactivated successfully. Sep 9 00:40:38.213000 audit[2160]: AVC avc: denied { write } for pid=2160 comm="tee" name="fd" dev="proc" ino=14005 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:40:38.213000 audit[2160]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe01307e8 a2=241 a3=1b6 items=1 ppid=2125 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.213000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 9 00:40:38.213000 audit: PATH item=0 name="/dev/fd/63" inode=14791 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:38.213000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:40:38.223000 audit[2182]: AVC avc: denied { write } for pid=2182 comm="tee" name="fd" dev="proc" ino=13196 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:40:38.223000 audit[2182]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc84927d9 a2=241 a3=1b6 items=1 ppid=2148 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.223000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 9 00:40:38.223000 audit: PATH item=0 name="/dev/fd/63" inode=15473 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:38.223000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:40:38.225000 audit[2180]: AVC avc: denied { write } for pid=2180 comm="tee" name="fd" dev="proc" ino=15480 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:40:38.225000 audit[2180]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffefc987e8 a2=241 a3=1b6 items=1 ppid=2121 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.225000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 9 00:40:38.225000 audit: PATH item=0 name="/dev/fd/63" inode=15472 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:38.225000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:40:38.245000 audit[2188]: AVC avc: denied { write } for pid=2188 comm="tee" name="fd" dev="proc" ino=14015 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:40:38.245000 audit[2188]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdff697e8 a2=241 a3=1b6 items=1 ppid=2118 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.245000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 9 00:40:38.245000 audit: PATH item=0 name="/dev/fd/63" inode=13200 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:38.245000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:40:38.246000 audit[2169]: AVC avc: denied { write } for pid=2169 comm="tee" name="fd" dev="proc" ino=13212 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:40:38.246000 audit[2169]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff5037d8 a2=241 a3=1b6 items=1 ppid=2126 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.246000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 9 00:40:38.246000 audit: PATH item=0 name="/dev/fd/63" inode=14794 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:38.246000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:40:38.250000 audit[2201]: AVC avc: denied { write } for pid=2201 comm="tee" name="fd" dev="proc" ino=13219 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:40:38.250000 audit[2201]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf01c7e9 a2=241 a3=1b6 items=1 ppid=2155 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.250000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 9 00:40:38.250000 audit: PATH item=0 name="/dev/fd/63" inode=13216 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:38.250000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:40:38.252000 audit[2198]: AVC avc: denied { write } for pid=2198 comm="tee" name="fd" dev="proc" ino=14798 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:40:38.252000 audit[2198]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc8ebc7ea a2=241 a3=1b6 items=1 ppid=2124 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.252000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 9 00:40:38.252000 audit: PATH item=0 name="/dev/fd/63" inode=14795 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:40:38.252000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit: BPF prog-id=81 op=LOAD Sep 9 00:40:38.307000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeff2e408 a2=98 a3=ffffeff2e3f8 items=0 ppid=2120 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.307000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:40:38.307000 audit: BPF prog-id=81 op=UNLOAD Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.307000 audit: BPF prog-id=82 op=LOAD Sep 9 00:40:38.307000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeff2e2b8 a2=74 a3=95 items=0 ppid=2120 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.307000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:40:38.308000 audit: BPF prog-id=82 op=UNLOAD Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit: BPF prog-id=83 op=LOAD Sep 9 00:40:38.308000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeff2e2e8 a2=40 a3=ffffeff2e318 items=0 ppid=2120 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.308000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:40:38.308000 audit: BPF prog-id=83 op=UNLOAD Sep 9 00:40:38.308000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.308000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffeff2e400 a2=50 a3=0 items=0 ppid=2120 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.308000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit: BPF prog-id=84 op=LOAD Sep 9 00:40:38.309000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf533118 a2=98 a3=ffffdf533108 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.309000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.309000 audit: BPF prog-id=84 op=UNLOAD Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit: BPF prog-id=85 op=LOAD Sep 9 00:40:38.309000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdf532da8 a2=74 a3=95 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.309000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.309000 audit: BPF prog-id=85 op=UNLOAD Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.309000 audit: BPF prog-id=86 op=LOAD Sep 9 00:40:38.309000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdf532e08 a2=94 a3=2 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.309000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.309000 audit: BPF prog-id=86 op=UNLOAD Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit: BPF prog-id=87 op=LOAD Sep 9 00:40:38.403000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdf532dc8 a2=40 a3=ffffdf532df8 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.403000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.403000 audit: BPF prog-id=87 op=UNLOAD Sep 9 00:40:38.403000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.403000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdf532ee0 a2=50 a3=0 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.403000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf532e38 a2=28 a3=ffffdf532f68 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf532e68 a2=28 a3=ffffdf532f98 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf532d18 a2=28 a3=ffffdf532e48 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf532e88 a2=28 a3=ffffdf532fb8 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf532e68 a2=28 a3=ffffdf532f98 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf532e58 a2=28 a3=ffffdf532f88 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf532e88 a2=28 a3=ffffdf532fb8 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf532e68 a2=28 a3=ffffdf532f98 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf532e88 a2=28 a3=ffffdf532fb8 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf532e58 a2=28 a3=ffffdf532f88 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf532ed8 a2=28 a3=ffffdf533018 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdf532c10 a2=50 a3=0 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit: BPF prog-id=88 op=LOAD Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdf532c18 a2=94 a3=5 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit: BPF prog-id=88 op=UNLOAD Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdf532d20 a2=50 a3=0 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdf532e68 a2=4 a3=3 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.412000 audit[2216]: AVC avc: denied { confidentiality } for pid=2216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:40:38.412000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdf532e48 a2=94 a3=6 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { confidentiality } for pid=2216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:40:38.413000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdf532618 a2=94 a3=83 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.413000 audit[2216]: AVC avc: denied { confidentiality } for pid=2216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:40:38.413000 audit[2216]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdf532618 a2=94 a3=83 items=0 ppid=2120 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit: BPF prog-id=89 op=LOAD Sep 9 00:40:38.421000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfd19478 a2=98 a3=ffffcfd19468 items=0 ppid=2120 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.421000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 9 00:40:38.421000 audit: BPF prog-id=89 op=UNLOAD Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit: BPF prog-id=90 op=LOAD Sep 9 00:40:38.421000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfd19328 a2=74 a3=95 items=0 ppid=2120 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.421000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 9 00:40:38.421000 audit: BPF prog-id=90 op=UNLOAD Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.421000 audit: BPF prog-id=91 op=LOAD Sep 9 00:40:38.421000 audit[2239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcfd19358 a2=40 a3=ffffcfd19388 items=0 ppid=2120 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.421000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 9 00:40:38.421000 audit: BPF prog-id=91 op=UNLOAD Sep 9 00:40:38.473704 systemd-networkd[1052]: vxlan.calico: Link UP Sep 9 00:40:38.473709 systemd-networkd[1052]: vxlan.calico: Gained carrier Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit: BPF prog-id=92 op=LOAD Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4153138 a2=98 a3=ffffc4153128 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit: BPF prog-id=92 op=UNLOAD Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit: BPF prog-id=93 op=LOAD Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4152e18 a2=74 a3=95 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit: BPF prog-id=93 op=UNLOAD Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit: BPF prog-id=94 op=LOAD Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4152e78 a2=94 a3=2 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit: BPF prog-id=94 op=UNLOAD Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc4152ea8 a2=28 a3=ffffc4152fd8 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4152ed8 a2=28 a3=ffffc4153008 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4152d88 a2=28 a3=ffffc4152eb8 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc4152ef8 a2=28 a3=ffffc4153028 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc4152ed8 a2=28 a3=ffffc4153008 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc4152ec8 a2=28 a3=ffffc4152ff8 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc4152ef8 a2=28 a3=ffffc4153028 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4152ed8 a2=28 a3=ffffc4153008 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4152ef8 a2=28 a3=ffffc4153028 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4152ec8 a2=28 a3=ffffc4152ff8 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc4152f48 a2=28 a3=ffffc4153088 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.493000 audit: BPF prog-id=95 op=LOAD Sep 9 00:40:38.493000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc4152d68 a2=40 a3=ffffc4152d98 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.493000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.493000 audit: BPF prog-id=95 op=UNLOAD Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc4152d90 a2=50 a3=0 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc4152d90 a2=50 a3=0 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit: BPF prog-id=96 op=LOAD Sep 9 00:40:38.494000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc41524f8 a2=94 a3=2 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.494000 audit: BPF prog-id=96 op=UNLOAD Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.494000 audit: BPF prog-id=97 op=LOAD Sep 9 00:40:38.494000 audit[2268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc4152688 a2=94 a3=30 items=0 ppid=2120 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.496000 audit: BPF prog-id=98 op=LOAD Sep 9 00:40:38.496000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3751058 a2=98 a3=ffffd3751048 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.496000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.497000 audit: BPF prog-id=98 op=UNLOAD Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit: BPF prog-id=99 op=LOAD Sep 9 00:40:38.497000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3750ce8 a2=74 a3=95 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.497000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.497000 audit: BPF prog-id=99 op=UNLOAD Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.497000 audit: BPF prog-id=100 op=LOAD Sep 9 00:40:38.497000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3750d48 a2=94 a3=2 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.497000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.497000 audit: BPF prog-id=100 op=UNLOAD Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit: BPF prog-id=101 op=LOAD Sep 9 00:40:38.582000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3750d08 a2=40 a3=ffffd3750d38 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.582000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.582000 audit: BPF prog-id=101 op=UNLOAD Sep 9 00:40:38.582000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.582000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd3750e20 a2=50 a3=0 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.582000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3750d78 a2=28 a3=ffffd3750ea8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3750da8 a2=28 a3=ffffd3750ed8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3750c58 a2=28 a3=ffffd3750d88 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3750dc8 a2=28 a3=ffffd3750ef8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3750da8 a2=28 a3=ffffd3750ed8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3750d98 a2=28 a3=ffffd3750ec8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3750dc8 a2=28 a3=ffffd3750ef8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3750da8 a2=28 a3=ffffd3750ed8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3750dc8 a2=28 a3=ffffd3750ef8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3750d98 a2=28 a3=ffffd3750ec8 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3750e18 a2=28 a3=ffffd3750f58 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.591000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.591000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd3750b50 a2=50 a3=0 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit: BPF prog-id=102 op=LOAD Sep 9 00:40:38.592000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd3750b58 a2=94 a3=5 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.592000 audit: BPF prog-id=102 op=UNLOAD Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd3750c60 a2=50 a3=0 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd3750da8 a2=4 a3=3 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { confidentiality } for pid=2270 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:40:38.592000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3750d88 a2=94 a3=6 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { confidentiality } for pid=2270 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:40:38.592000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3750558 a2=94 a3=83 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.592000 audit[2270]: AVC avc: denied { confidentiality } for pid=2270 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:40:38.592000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3750558 a2=94 a3=83 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.593000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.593000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3751f98 a2=10 a3=ffffd3752088 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.593000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.593000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3751e58 a2=10 a3=ffffd3751f48 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.593000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.593000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3751dc8 a2=10 a3=ffffd3751f48 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.593000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:38.593000 audit[2270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3751dc8 a2=10 a3=ffffd3751f48 items=0 ppid=2120 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:40:38.602000 audit: BPF prog-id=97 op=UNLOAD Sep 9 00:40:38.641000 audit[2298]: NETFILTER_CFG table=nat:65 family=2 entries=15 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:38.641000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc752ef40 a2=0 a3=ffffaff96fa8 items=0 ppid=2120 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:38.642000 audit[2297]: NETFILTER_CFG table=filter:66 family=2 entries=39 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:38.642000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc72e38b0 a2=0 a3=ffff8ad4dfa8 items=0 ppid=2120 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.642000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:38.643000 audit[2299]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:38.643000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd3e79bb0 a2=0 a3=ffffaa66afa8 items=0 ppid=2120 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.643000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:38.645000 audit[2296]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:38.645000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffded3c6e0 a2=0 a3=ffffb7bf7fa8 items=0 ppid=2120 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:38.645000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:38.811950 kubelet[1454]: E0909 00:40:38.811830 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:39.812619 kubelet[1454]: E0909 00:40:39.812566 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:40.218571 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL Sep 9 00:40:40.813617 kubelet[1454]: E0909 00:40:40.813570 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:41.799996 kubelet[1454]: E0909 00:40:41.799929 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:41.814317 kubelet[1454]: E0909 00:40:41.814281 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:41.952839 env[1213]: time="2025-09-09T00:40:41.952796363Z" level=info msg="StopPodSandbox for \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\"" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.000 [INFO][2321] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.000 [INFO][2321] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" iface="eth0" netns="/var/run/netns/cni-9f07f05e-2e2d-93f3-a203-159600dc8993" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.000 [INFO][2321] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" iface="eth0" netns="/var/run/netns/cni-9f07f05e-2e2d-93f3-a203-159600dc8993" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.001 [INFO][2321] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" iface="eth0" netns="/var/run/netns/cni-9f07f05e-2e2d-93f3-a203-159600dc8993" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.001 [INFO][2321] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.001 [INFO][2321] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.048 [INFO][2330] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" HandleID="k8s-pod-network.9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Workload="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.048 [INFO][2330] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.048 [INFO][2330] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.060 [WARNING][2330] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" HandleID="k8s-pod-network.9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Workload="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.060 [INFO][2330] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" HandleID="k8s-pod-network.9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Workload="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.062 [INFO][2330] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:40:42.066140 env[1213]: 2025-09-09 00:40:42.064 [INFO][2321] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced" Sep 9 00:40:42.068289 env[1213]: time="2025-09-09T00:40:42.067989023Z" level=info msg="TearDown network for sandbox \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\" successfully" Sep 9 00:40:42.067905 systemd[1]: run-netns-cni\x2d9f07f05e\x2d2e2d\x2d93f3\x2da203\x2d159600dc8993.mount: Deactivated successfully. Sep 9 00:40:42.068566 env[1213]: time="2025-09-09T00:40:42.068295597Z" level=info msg="StopPodSandbox for \"9afcd32f7049a14472c85bd6363042bb54f20885c6ceef7f5cd5378b6cc02ced\" returns successfully" Sep 9 00:40:42.069143 env[1213]: time="2025-09-09T00:40:42.069113567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k2ltc,Uid:c3f1badc-b122-486a-b16d-d9c6ae06ee16,Namespace:calico-system,Attempt:1,}" Sep 9 00:40:42.222256 systemd-networkd[1052]: calic96833d3f14: Link UP Sep 9 00:40:42.222573 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:40:42.222607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic96833d3f14: link becomes ready Sep 9 00:40:42.222723 systemd-networkd[1052]: calic96833d3f14: Gained carrier Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.157 [INFO][2338] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.107-k8s-csi--node--driver--k2ltc-eth0 csi-node-driver- calico-system c3f1badc-b122-486a-b16d-d9c6ae06ee16 1238 0 2025-09-09 00:40:22 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.107 csi-node-driver-k2ltc eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic96833d3f14 [] [] }} ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.157 [INFO][2338] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.180 [INFO][2353] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" HandleID="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Workload="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.180 [INFO][2353] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" HandleID="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Workload="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000512b30), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.107", "pod":"csi-node-driver-k2ltc", "timestamp":"2025-09-09 00:40:42.18067152 +0000 UTC"}, Hostname:"10.0.0.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.180 [INFO][2353] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.181 [INFO][2353] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.181 [INFO][2353] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.107' Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.192 [INFO][2353] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.197 [INFO][2353] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.201 [INFO][2353] ipam/ipam.go 511: Trying affinity for 192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.203 [INFO][2353] ipam/ipam.go 158: Attempting to load block cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.205 [INFO][2353] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.205 [INFO][2353] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.117.0/26 handle="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.207 [INFO][2353] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.211 [INFO][2353] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.117.0/26 handle="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.216 [INFO][2353] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.117.1/26] block=192.168.117.0/26 handle="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.216 [INFO][2353] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.117.1/26] handle="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" host="10.0.0.107" Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.217 [INFO][2353] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:40:42.236611 env[1213]: 2025-09-09 00:40:42.217 [INFO][2353] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.1/26] IPv6=[] ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" HandleID="k8s-pod-network.575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Workload="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.237343 env[1213]: 2025-09-09 00:40:42.219 [INFO][2338] cni-plugin/k8s.go 418: Populated endpoint ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-csi--node--driver--k2ltc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c3f1badc-b122-486a-b16d-d9c6ae06ee16", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"", Pod:"csi-node-driver-k2ltc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.117.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic96833d3f14", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:40:42.237343 env[1213]: 2025-09-09 00:40:42.219 [INFO][2338] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.117.1/32] ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.237343 env[1213]: 2025-09-09 00:40:42.219 [INFO][2338] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic96833d3f14 ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.237343 env[1213]: 2025-09-09 00:40:42.222 [INFO][2338] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.237343 env[1213]: 2025-09-09 00:40:42.224 [INFO][2338] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-csi--node--driver--k2ltc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c3f1badc-b122-486a-b16d-d9c6ae06ee16", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d", Pod:"csi-node-driver-k2ltc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.117.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic96833d3f14", MAC:"72:57:f0:c8:a7:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:40:42.237343 env[1213]: 2025-09-09 00:40:42.234 [INFO][2338] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d" Namespace="calico-system" Pod="csi-node-driver-k2ltc" WorkloadEndpoint="10.0.0.107-k8s-csi--node--driver--k2ltc-eth0" Sep 9 00:40:42.246499 env[1213]: time="2025-09-09T00:40:42.246378666Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:40:42.246620 env[1213]: time="2025-09-09T00:40:42.246508007Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:40:42.246620 env[1213]: time="2025-09-09T00:40:42.246534916Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:40:42.246778 env[1213]: time="2025-09-09T00:40:42.246737897Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d pid=2380 runtime=io.containerd.runc.v2 Sep 9 00:40:42.263631 systemd[1]: Started cri-containerd-575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d.scope. Sep 9 00:40:42.270494 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 9 00:40:42.270586 kernel: audit: type=1325 audit(1757378442.250:639): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:42.250000 audit[2379]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:42.250000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffe95e4690 a2=0 a3=ffff9a106fa8 items=0 ppid=2120 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:42.275118 kernel: audit: type=1300 audit(1757378442.250:639): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffe95e4690 a2=0 a3=ffff9a106fa8 items=0 ppid=2120 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:42.275157 kernel: audit: type=1327 audit(1757378442.250:639): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:42.250000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.282190 kernel: audit: type=1400 audit(1757378442.276:640): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.282246 kernel: audit: type=1400 audit(1757378442.276:641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.285073 kernel: audit: type=1400 audit(1757378442.276:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.285109 kernel: audit: type=1400 audit(1757378442.276:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.288981 kernel: audit: type=1400 audit(1757378442.276:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.289043 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.291034 kernel: audit: type=1400 audit(1757378442.276:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.291089 kernel: audit: type=1400 audit(1757378442.276:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.278000 audit: BPF prog-id=103 op=LOAD Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2380 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:42.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537356264313239616133613136666162646165316334343264333135 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2380 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:42.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537356264313239616133613136666162646165316334343264333135 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit: BPF prog-id=104 op=LOAD Sep 9 00:40:42.281000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2380 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:42.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537356264313239616133613136666162646165316334343264333135 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit: BPF prog-id=105 op=LOAD Sep 9 00:40:42.281000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2380 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:42.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537356264313239616133613136666162646165316334343264333135 Sep 9 00:40:42.281000 audit: BPF prog-id=105 op=UNLOAD Sep 9 00:40:42.281000 audit: BPF prog-id=104 op=UNLOAD Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:42.281000 audit: BPF prog-id=106 op=LOAD Sep 9 00:40:42.281000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2380 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:42.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537356264313239616133613136666162646165316334343264333135 Sep 9 00:40:42.301941 env[1213]: time="2025-09-09T00:40:42.301904687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k2ltc,Uid:c3f1badc-b122-486a-b16d-d9c6ae06ee16,Namespace:calico-system,Attempt:1,} returns sandbox id \"575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d\"" Sep 9 00:40:42.303481 env[1213]: time="2025-09-09T00:40:42.303448408Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 9 00:40:42.815251 kubelet[1454]: E0909 00:40:42.815178 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:43.068055 systemd[1]: run-containerd-runc-k8s.io-575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d-runc.QQGct5.mount: Deactivated successfully. Sep 9 00:40:43.274915 env[1213]: time="2025-09-09T00:40:43.274849034Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:43.276734 env[1213]: time="2025-09-09T00:40:43.276695433Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:43.278256 env[1213]: time="2025-09-09T00:40:43.278219205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:43.280015 env[1213]: time="2025-09-09T00:40:43.279977681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:43.280446 env[1213]: time="2025-09-09T00:40:43.280423025Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 9 00:40:43.282721 env[1213]: time="2025-09-09T00:40:43.282682178Z" level=info msg="CreateContainer within sandbox \"575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 9 00:40:43.293634 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3072942242.mount: Deactivated successfully. Sep 9 00:40:43.297826 env[1213]: time="2025-09-09T00:40:43.297788733Z" level=info msg="CreateContainer within sandbox \"575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8cf8a51025c35b1529dd4732674c27c17d3b4bcd6682fc16cebb02781bad8abb\"" Sep 9 00:40:43.298279 env[1213]: time="2025-09-09T00:40:43.298246489Z" level=info msg="StartContainer for \"8cf8a51025c35b1529dd4732674c27c17d3b4bcd6682fc16cebb02781bad8abb\"" Sep 9 00:40:43.313171 systemd[1]: Started cri-containerd-8cf8a51025c35b1529dd4732674c27c17d3b4bcd6682fc16cebb02781bad8abb.scope. Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2380 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:43.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663861353130323563333562313532396464343733323637346332 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit: BPF prog-id=107 op=LOAD Sep 9 00:40:43.333000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2380 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:43.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663861353130323563333562313532396464343733323637346332 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit: BPF prog-id=108 op=LOAD Sep 9 00:40:43.333000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2380 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:43.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663861353130323563333562313532396464343733323637346332 Sep 9 00:40:43.333000 audit: BPF prog-id=108 op=UNLOAD Sep 9 00:40:43.333000 audit: BPF prog-id=107 op=UNLOAD Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:43.333000 audit: BPF prog-id=109 op=LOAD Sep 9 00:40:43.333000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2380 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:43.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663861353130323563333562313532396464343733323637346332 Sep 9 00:40:43.347206 env[1213]: time="2025-09-09T00:40:43.347093075Z" level=info msg="StartContainer for \"8cf8a51025c35b1529dd4732674c27c17d3b4bcd6682fc16cebb02781bad8abb\" returns successfully" Sep 9 00:40:43.348561 env[1213]: time="2025-09-09T00:40:43.348518993Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 9 00:40:43.537000 audit[2451]: NETFILTER_CFG table=filter:70 family=2 entries=11 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:43.537000 audit[2451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff8e3e6f0 a2=0 a3=1 items=0 ppid=1682 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:43.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:43.548000 audit[2451]: NETFILTER_CFG table=nat:71 family=2 entries=29 op=nft_register_chain pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:43.548000 audit[2451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=fffff8e3e6f0 a2=0 a3=1 items=0 ppid=1682 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:43.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:43.815774 kubelet[1454]: E0909 00:40:43.815718 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:44.068141 systemd[1]: run-containerd-runc-k8s.io-8cf8a51025c35b1529dd4732674c27c17d3b4bcd6682fc16cebb02781bad8abb-runc.QIKj66.mount: Deactivated successfully. Sep 9 00:40:44.250667 systemd-networkd[1052]: calic96833d3f14: Gained IPv6LL Sep 9 00:40:44.410121 env[1213]: time="2025-09-09T00:40:44.410000605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:44.411284 env[1213]: time="2025-09-09T00:40:44.411251008Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:44.412593 env[1213]: time="2025-09-09T00:40:44.412566745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:44.413922 env[1213]: time="2025-09-09T00:40:44.413896774Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:44.414344 env[1213]: time="2025-09-09T00:40:44.414317965Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 9 00:40:44.416298 env[1213]: time="2025-09-09T00:40:44.416266590Z" level=info msg="CreateContainer within sandbox \"575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 9 00:40:44.426307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount976202218.mount: Deactivated successfully. Sep 9 00:40:44.429312 env[1213]: time="2025-09-09T00:40:44.429260465Z" level=info msg="CreateContainer within sandbox \"575bd129aa3a16fabdae1c442d315032da0e17b8b234475fd1ab4b023159482d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fb07ee528599e222dab2a3813e78b2c88f2ec14e2f9fa3620e32b0e9f593b556\"" Sep 9 00:40:44.429872 env[1213]: time="2025-09-09T00:40:44.429840989Z" level=info msg="StartContainer for \"fb07ee528599e222dab2a3813e78b2c88f2ec14e2f9fa3620e32b0e9f593b556\"" Sep 9 00:40:44.448724 systemd[1]: Started cri-containerd-fb07ee528599e222dab2a3813e78b2c88f2ec14e2f9fa3620e32b0e9f593b556.scope. Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2380 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:44.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303765653532383539396532323264616232613338313365373862 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit: BPF prog-id=110 op=LOAD Sep 9 00:40:44.463000 audit[2466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2380 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:44.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303765653532383539396532323264616232613338313365373862 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.463000 audit: BPF prog-id=111 op=LOAD Sep 9 00:40:44.463000 audit[2466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2380 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:44.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303765653532383539396532323264616232613338313365373862 Sep 9 00:40:44.464000 audit: BPF prog-id=111 op=UNLOAD Sep 9 00:40:44.464000 audit: BPF prog-id=110 op=UNLOAD Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:44.464000 audit: BPF prog-id=112 op=LOAD Sep 9 00:40:44.464000 audit[2466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2380 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:44.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303765653532383539396532323264616232613338313365373862 Sep 9 00:40:44.476994 env[1213]: time="2025-09-09T00:40:44.476925132Z" level=info msg="StartContainer for \"fb07ee528599e222dab2a3813e78b2c88f2ec14e2f9fa3620e32b0e9f593b556\" returns successfully" Sep 9 00:40:44.816154 kubelet[1454]: E0909 00:40:44.816115 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:44.952822 env[1213]: time="2025-09-09T00:40:44.952770089Z" level=info msg="StopPodSandbox for \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\"" Sep 9 00:40:44.954244 kubelet[1454]: I0909 00:40:44.954213 1454 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 9 00:40:44.954244 kubelet[1454]: I0909 00:40:44.954246 1454 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 9 00:40:45.024035 kubelet[1454]: I0909 00:40:45.023980 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-k2ltc" podStartSLOduration=20.911912488 podStartE2EDuration="23.023957621s" podCreationTimestamp="2025-09-09 00:40:22 +0000 UTC" firstStartedPulling="2025-09-09 00:40:42.302996035 +0000 UTC m=+21.666657173" lastFinishedPulling="2025-09-09 00:40:44.415041128 +0000 UTC m=+23.778702306" observedRunningTime="2025-09-09 00:40:45.023758556 +0000 UTC m=+24.387419734" watchObservedRunningTime="2025-09-09 00:40:45.023957621 +0000 UTC m=+24.387618799" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:44.996 [INFO][2510] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:44.996 [INFO][2510] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" iface="eth0" netns="/var/run/netns/cni-6133f063-b83f-41de-9641-ebcc41f1c52c" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:44.996 [INFO][2510] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" iface="eth0" netns="/var/run/netns/cni-6133f063-b83f-41de-9641-ebcc41f1c52c" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:44.996 [INFO][2510] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" iface="eth0" netns="/var/run/netns/cni-6133f063-b83f-41de-9641-ebcc41f1c52c" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:44.996 [INFO][2510] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:44.996 [INFO][2510] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:45.014 [INFO][2520] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" HandleID="k8s-pod-network.bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Workload="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:45.014 [INFO][2520] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:45.014 [INFO][2520] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:45.023 [WARNING][2520] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" HandleID="k8s-pod-network.bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Workload="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:45.023 [INFO][2520] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" HandleID="k8s-pod-network.bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Workload="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:45.025 [INFO][2520] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:40:45.028373 env[1213]: 2025-09-09 00:40:45.026 [INFO][2510] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff" Sep 9 00:40:45.028790 env[1213]: time="2025-09-09T00:40:45.028529958Z" level=info msg="TearDown network for sandbox \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\" successfully" Sep 9 00:40:45.028790 env[1213]: time="2025-09-09T00:40:45.028564063Z" level=info msg="StopPodSandbox for \"bc8284770c5cdf7d9b1e96209230c1f5607af0cb9b2051e1b9f8f77d08ea24ff\" returns successfully" Sep 9 00:40:45.029350 env[1213]: time="2025-09-09T00:40:45.029319254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x64dq,Uid:02b2b8c9-9d21-4468-99ee-b12c80fc814a,Namespace:default,Attempt:1,}" Sep 9 00:40:45.069072 systemd[1]: run-netns-cni\x2d6133f063\x2db83f\x2d41de\x2d9641\x2debcc41f1c52c.mount: Deactivated successfully. Sep 9 00:40:45.133458 systemd-networkd[1052]: cali0675ad29075: Link UP Sep 9 00:40:45.134755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:40:45.134842 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0675ad29075: link becomes ready Sep 9 00:40:45.134958 systemd-networkd[1052]: cali0675ad29075: Gained carrier Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.075 [INFO][2529] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0 nginx-deployment-7fcdb87857- default 02b2b8c9-9d21-4468-99ee-b12c80fc814a 1267 0 2025-09-09 00:40:33 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.107 nginx-deployment-7fcdb87857-x64dq eth0 default [] [] [kns.default ksa.default.default] cali0675ad29075 [] [] }} ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.075 [INFO][2529] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.096 [INFO][2544] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" HandleID="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Workload="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.097 [INFO][2544] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" HandleID="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Workload="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011bf30), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.107", "pod":"nginx-deployment-7fcdb87857-x64dq", "timestamp":"2025-09-09 00:40:45.096940959 +0000 UTC"}, Hostname:"10.0.0.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.097 [INFO][2544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.097 [INFO][2544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.097 [INFO][2544] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.107' Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.106 [INFO][2544] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.111 [INFO][2544] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.115 [INFO][2544] ipam/ipam.go 511: Trying affinity for 192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.117 [INFO][2544] ipam/ipam.go 158: Attempting to load block cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.119 [INFO][2544] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.119 [INFO][2544] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.117.0/26 handle="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.120 [INFO][2544] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.124 [INFO][2544] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.117.0/26 handle="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.129 [INFO][2544] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.117.2/26] block=192.168.117.0/26 handle="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.129 [INFO][2544] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.117.2/26] handle="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" host="10.0.0.107" Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.129 [INFO][2544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:40:45.143600 env[1213]: 2025-09-09 00:40:45.129 [INFO][2544] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.2/26] IPv6=[] ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" HandleID="k8s-pod-network.0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Workload="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.144178 env[1213]: 2025-09-09 00:40:45.130 [INFO][2529] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"02b2b8c9-9d21-4468-99ee-b12c80fc814a", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-x64dq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0675ad29075", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:40:45.144178 env[1213]: 2025-09-09 00:40:45.130 [INFO][2529] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.117.2/32] ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.144178 env[1213]: 2025-09-09 00:40:45.130 [INFO][2529] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0675ad29075 ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.144178 env[1213]: 2025-09-09 00:40:45.135 [INFO][2529] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.144178 env[1213]: 2025-09-09 00:40:45.135 [INFO][2529] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"02b2b8c9-9d21-4468-99ee-b12c80fc814a", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d", Pod:"nginx-deployment-7fcdb87857-x64dq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0675ad29075", MAC:"c6:81:76:4a:36:17", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:40:45.144178 env[1213]: 2025-09-09 00:40:45.142 [INFO][2529] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d" Namespace="default" Pod="nginx-deployment-7fcdb87857-x64dq" WorkloadEndpoint="10.0.0.107-k8s-nginx--deployment--7fcdb87857--x64dq-eth0" Sep 9 00:40:45.150000 audit[2567]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2567 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:45.152679 env[1213]: time="2025-09-09T00:40:45.152489974Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:40:45.152679 env[1213]: time="2025-09-09T00:40:45.152529763Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:40:45.152679 env[1213]: time="2025-09-09T00:40:45.152539851Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:40:45.152775 env[1213]: time="2025-09-09T00:40:45.152687238Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d pid=2568 runtime=io.containerd.runc.v2 Sep 9 00:40:45.150000 audit[2567]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=fffffeae92e0 a2=0 a3=ffffb689bfa8 items=0 ppid=2120 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:45.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:45.165528 systemd[1]: Started cri-containerd-0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d.scope. Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.180000 audit: BPF prog-id=113 op=LOAD Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2568 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:45.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333866653864373762333033646137386432326235316135333731 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2568 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:45.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333866653864373762333033646137386432326235316135333731 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit: BPF prog-id=114 op=LOAD Sep 9 00:40:45.181000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2568 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:45.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333866653864373762333033646137386432326235316135333731 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit: BPF prog-id=115 op=LOAD Sep 9 00:40:45.181000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2568 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:45.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333866653864373762333033646137386432326235316135333731 Sep 9 00:40:45.181000 audit: BPF prog-id=115 op=UNLOAD Sep 9 00:40:45.181000 audit: BPF prog-id=114 op=UNLOAD Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:45.181000 audit: BPF prog-id=116 op=LOAD Sep 9 00:40:45.181000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2568 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:45.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035333866653864373762333033646137386432326235316135333731 Sep 9 00:40:45.183467 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:40:45.199756 env[1213]: time="2025-09-09T00:40:45.199705909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-x64dq,Uid:02b2b8c9-9d21-4468-99ee-b12c80fc814a,Namespace:default,Attempt:1,} returns sandbox id \"0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d\"" Sep 9 00:40:45.200858 env[1213]: time="2025-09-09T00:40:45.200808994Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 9 00:40:45.816418 kubelet[1454]: E0909 00:40:45.816316 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:46.816843 kubelet[1454]: E0909 00:40:46.816780 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:47.131187 systemd-networkd[1052]: cali0675ad29075: Gained IPv6LL Sep 9 00:40:47.450386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1420138658.mount: Deactivated successfully. Sep 9 00:40:47.817350 kubelet[1454]: E0909 00:40:47.817271 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:48.817867 kubelet[1454]: E0909 00:40:48.817819 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:48.864680 env[1213]: time="2025-09-09T00:40:48.864631898Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:48.867706 env[1213]: time="2025-09-09T00:40:48.867662548Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:48.869762 env[1213]: time="2025-09-09T00:40:48.869736693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:48.871813 env[1213]: time="2025-09-09T00:40:48.871772166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:48.872699 env[1213]: time="2025-09-09T00:40:48.872665695Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 9 00:40:48.879996 env[1213]: time="2025-09-09T00:40:48.879955851Z" level=info msg="CreateContainer within sandbox \"0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 9 00:40:48.897099 env[1213]: time="2025-09-09T00:40:48.897030911Z" level=info msg="CreateContainer within sandbox \"0538fe8d77b303da78d22b51a537155b2658857e02c9213b22ecec2dcbbeb78d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f7cc6913c27a8ccf0b5fffb402232ac61566365cffa7ae14d1052a6c652817e7\"" Sep 9 00:40:48.897740 env[1213]: time="2025-09-09T00:40:48.897512046Z" level=info msg="StartContainer for \"f7cc6913c27a8ccf0b5fffb402232ac61566365cffa7ae14d1052a6c652817e7\"" Sep 9 00:40:48.919554 systemd[1]: run-containerd-runc-k8s.io-f7cc6913c27a8ccf0b5fffb402232ac61566365cffa7ae14d1052a6c652817e7-runc.3dECuz.mount: Deactivated successfully. Sep 9 00:40:48.921896 systemd[1]: Started cri-containerd-f7cc6913c27a8ccf0b5fffb402232ac61566365cffa7ae14d1052a6c652817e7.scope. Sep 9 00:40:48.940436 kernel: kauditd_printk_skb: 202 callbacks suppressed Sep 9 00:40:48.940562 kernel: audit: type=1400 audit(1757378448.935:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940601 kernel: audit: type=1400 audit(1757378448.935:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.941807 kernel: audit: type=1400 audit(1757378448.935:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.943870 kernel: audit: type=1400 audit(1757378448.935:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.945859 kernel: audit: type=1400 audit(1757378448.935:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.950078 kernel: audit: type=1400 audit(1757378448.935:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.950162 kernel: audit: type=1400 audit(1757378448.935:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.953815 kernel: audit: type=1400 audit(1757378448.935:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.956418 kernel: audit: type=1400 audit(1757378448.935:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.958601 kernel: audit: type=1400 audit(1757378448.936:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit: BPF prog-id=117 op=LOAD Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2568 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:48.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636336393133633237613863636630623566666662343032323332 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2568 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:48.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636336393133633237613863636630623566666662343032323332 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.936000 audit: BPF prog-id=118 op=LOAD Sep 9 00:40:48.936000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2568 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:48.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636336393133633237613863636630623566666662343032323332 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.938000 audit: BPF prog-id=119 op=LOAD Sep 9 00:40:48.938000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2568 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:48.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636336393133633237613863636630623566666662343032323332 Sep 9 00:40:48.940000 audit: BPF prog-id=119 op=UNLOAD Sep 9 00:40:48.940000 audit: BPF prog-id=118 op=UNLOAD Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:48.940000 audit: BPF prog-id=120 op=LOAD Sep 9 00:40:48.940000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2568 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:48.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636336393133633237613863636630623566666662343032323332 Sep 9 00:40:48.964729 env[1213]: time="2025-09-09T00:40:48.964554083Z" level=info msg="StartContainer for \"f7cc6913c27a8ccf0b5fffb402232ac61566365cffa7ae14d1052a6c652817e7\" returns successfully" Sep 9 00:40:49.034701 kubelet[1454]: I0909 00:40:49.034634 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-x64dq" podStartSLOduration=12.356797729 podStartE2EDuration="16.034617599s" podCreationTimestamp="2025-09-09 00:40:33 +0000 UTC" firstStartedPulling="2025-09-09 00:40:45.200462701 +0000 UTC m=+24.564123839" lastFinishedPulling="2025-09-09 00:40:48.878282531 +0000 UTC m=+28.241943709" observedRunningTime="2025-09-09 00:40:49.03418881 +0000 UTC m=+28.397849988" watchObservedRunningTime="2025-09-09 00:40:49.034617599 +0000 UTC m=+28.398278777" Sep 9 00:40:49.818470 kubelet[1454]: E0909 00:40:49.818386 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:50.248000 audit[2667]: NETFILTER_CFG table=filter:73 family=2 entries=22 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:50.248000 audit[2667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffde96b760 a2=0 a3=1 items=0 ppid=1682 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:50.263000 audit[2667]: NETFILTER_CFG table=nat:74 family=2 entries=24 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:50.263000 audit[2667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffde96b760 a2=0 a3=1 items=0 ppid=1682 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:50.278000 audit[2669]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_rule pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:50.278000 audit[2669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffe9d43160 a2=0 a3=1 items=0 ppid=1682 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:50.292000 audit[2669]: NETFILTER_CFG table=nat:76 family=2 entries=24 op=nft_register_rule pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:50.292000 audit[2669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffe9d43160 a2=0 a3=1 items=0 ppid=1682 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:50.296717 systemd[1]: Created slice kubepods-besteffort-pod72a6e56d_9684_41b7_aece_91b53a51a50b.slice. Sep 9 00:40:50.394944 kubelet[1454]: I0909 00:40:50.394780 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/72a6e56d-9684-41b7-aece-91b53a51a50b-data\") pod \"nfs-server-provisioner-0\" (UID: \"72a6e56d-9684-41b7-aece-91b53a51a50b\") " pod="default/nfs-server-provisioner-0" Sep 9 00:40:50.394944 kubelet[1454]: I0909 00:40:50.394835 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xmdr9\" (UniqueName: \"kubernetes.io/projected/72a6e56d-9684-41b7-aece-91b53a51a50b-kube-api-access-xmdr9\") pod \"nfs-server-provisioner-0\" (UID: \"72a6e56d-9684-41b7-aece-91b53a51a50b\") " pod="default/nfs-server-provisioner-0" Sep 9 00:40:50.600282 env[1213]: time="2025-09-09T00:40:50.600239591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:72a6e56d-9684-41b7-aece-91b53a51a50b,Namespace:default,Attempt:0,}" Sep 9 00:40:50.733902 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:40:50.734058 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 9 00:40:50.734379 systemd-networkd[1052]: cali60e51b789ff: Link UP Sep 9 00:40:50.734980 systemd-networkd[1052]: cali60e51b789ff: Gained carrier Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.653 [INFO][2671] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.107-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 72a6e56d-9684-41b7-aece-91b53a51a50b 1310 0 2025-09-09 00:40:50 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.107 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.653 [INFO][2671] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.685 [INFO][2686] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" HandleID="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Workload="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.686 [INFO][2686] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" HandleID="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Workload="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000137640), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.107", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-09 00:40:50.685778552 +0000 UTC"}, Hostname:"10.0.0.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.686 [INFO][2686] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.686 [INFO][2686] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.686 [INFO][2686] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.107' Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.696 [INFO][2686] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.700 [INFO][2686] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.705 [INFO][2686] ipam/ipam.go 511: Trying affinity for 192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.710 [INFO][2686] ipam/ipam.go 158: Attempting to load block cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.715 [INFO][2686] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.715 [INFO][2686] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.117.0/26 handle="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.718 [INFO][2686] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9 Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.722 [INFO][2686] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.117.0/26 handle="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.727 [INFO][2686] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.117.3/26] block=192.168.117.0/26 handle="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.727 [INFO][2686] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.117.3/26] handle="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" host="10.0.0.107" Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.727 [INFO][2686] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:40:50.746485 env[1213]: 2025-09-09 00:40:50.727 [INFO][2686] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.3/26] IPv6=[] ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" HandleID="k8s-pod-network.6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Workload="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:40:50.747195 env[1213]: 2025-09-09 00:40:50.729 [INFO][2671] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"72a6e56d-9684-41b7-aece-91b53a51a50b", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.117.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:40:50.747195 env[1213]: 2025-09-09 00:40:50.729 [INFO][2671] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.117.3/32] ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:40:50.747195 env[1213]: 2025-09-09 00:40:50.729 [INFO][2671] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:40:50.747195 env[1213]: 2025-09-09 00:40:50.734 [INFO][2671] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:40:50.747590 env[1213]: 2025-09-09 00:40:50.735 [INFO][2671] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"72a6e56d-9684-41b7-aece-91b53a51a50b", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.117.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"6e:e5:79:71:72:e5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:40:50.747590 env[1213]: 2025-09-09 00:40:50.745 [INFO][2671] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.107-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:40:50.760000 audit[2704]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:40:50.760000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=fffffaf9ec00 a2=0 a3=ffff97656fa8 items=0 ppid=2120 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:40:50.777263 env[1213]: time="2025-09-09T00:40:50.777192875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:40:50.777528 env[1213]: time="2025-09-09T00:40:50.777269454Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:40:50.777528 env[1213]: time="2025-09-09T00:40:50.777301399Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:40:50.781553 env[1213]: time="2025-09-09T00:40:50.777466566Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9 pid=2713 runtime=io.containerd.runc.v2 Sep 9 00:40:50.787718 systemd[1]: Started cri-containerd-6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9.scope. Sep 9 00:40:50.818900 kubelet[1454]: E0909 00:40:50.818828 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.818000 audit: BPF prog-id=121 op=LOAD Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2713 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356135356231636639343630633830643138353834356639616166 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2713 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356135356231636639343630633830643138353834356639616166 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit: BPF prog-id=122 op=LOAD Sep 9 00:40:50.819000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2713 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356135356231636639343630633830643138353834356639616166 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit: BPF prog-id=123 op=LOAD Sep 9 00:40:50.819000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2713 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356135356231636639343630633830643138353834356639616166 Sep 9 00:40:50.819000 audit: BPF prog-id=123 op=UNLOAD Sep 9 00:40:50.819000 audit: BPF prog-id=122 op=UNLOAD Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:50.819000 audit: BPF prog-id=124 op=LOAD Sep 9 00:40:50.819000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2713 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:50.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356135356231636639343630633830643138353834356639616166 Sep 9 00:40:50.821597 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:40:50.838024 env[1213]: time="2025-09-09T00:40:50.837977022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:72a6e56d-9684-41b7-aece-91b53a51a50b,Namespace:default,Attempt:0,} returns sandbox id \"6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9\"" Sep 9 00:40:50.839536 env[1213]: time="2025-09-09T00:40:50.839504077Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 9 00:40:51.819263 kubelet[1454]: E0909 00:40:51.819199 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:51.930605 systemd-networkd[1052]: cali60e51b789ff: Gained IPv6LL Sep 9 00:40:52.819691 kubelet[1454]: E0909 00:40:52.819365 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:52.847317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3282397993.mount: Deactivated successfully. Sep 9 00:40:53.480000 audit[2748]: NETFILTER_CFG table=filter:78 family=2 entries=33 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:53.480000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff7815270 a2=0 a3=1 items=0 ppid=1682 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:53.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:53.489000 audit[2748]: NETFILTER_CFG table=nat:79 family=2 entries=31 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:53.489000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=fffff7815270 a2=0 a3=1 items=0 ppid=1682 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:53.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:53.820338 kubelet[1454]: E0909 00:40:53.820273 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:54.674120 env[1213]: time="2025-09-09T00:40:54.674066955Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:54.675803 env[1213]: time="2025-09-09T00:40:54.675763166Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:54.677621 env[1213]: time="2025-09-09T00:40:54.677587015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:54.679030 env[1213]: time="2025-09-09T00:40:54.679000089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:40:54.680423 env[1213]: time="2025-09-09T00:40:54.680379143Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 9 00:40:54.682337 env[1213]: time="2025-09-09T00:40:54.682301813Z" level=info msg="CreateContainer within sandbox \"6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 9 00:40:54.693200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1435384142.mount: Deactivated successfully. Sep 9 00:40:54.696980 env[1213]: time="2025-09-09T00:40:54.696933792Z" level=info msg="CreateContainer within sandbox \"6c5a55b1cf9460c80d185845f9aaf309b07b3fa756fe2aefd30706d82a65aed9\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e931e576c6f406205a3c6fdc689753411bbbcd98d28b9746c64cb23dc2faf9c5\"" Sep 9 00:40:54.697498 env[1213]: time="2025-09-09T00:40:54.697450271Z" level=info msg="StartContainer for \"e931e576c6f406205a3c6fdc689753411bbbcd98d28b9746c64cb23dc2faf9c5\"" Sep 9 00:40:54.716948 systemd[1]: Started cri-containerd-e931e576c6f406205a3c6fdc689753411bbbcd98d28b9746c64cb23dc2faf9c5.scope. Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.735590 kernel: kauditd_printk_skb: 125 callbacks suppressed Sep 9 00:40:54.735653 kernel: audit: type=1400 audit(1757378454.733:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739812 kernel: audit: type=1400 audit(1757378454.733:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739879 kernel: audit: type=1400 audit(1757378454.733:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.743919 kernel: audit: type=1400 audit(1757378454.733:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.744069 kernel: audit: type=1400 audit(1757378454.733:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.748199 kernel: audit: type=1400 audit(1757378454.733:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.748264 kernel: audit: type=1400 audit(1757378454.733:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.750145 kernel: audit: type=1400 audit(1757378454.733:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.754032 kernel: audit: type=1400 audit(1757378454.733:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.754543 kernel: audit: type=1400 audit(1757378454.734:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.734000 audit: BPF prog-id=125 op=LOAD Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2713 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:54.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333165353736633666343036323035613363366664633638393735 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2713 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:54.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333165353736633666343036323035613363366664633638393735 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.737000 audit: BPF prog-id=126 op=LOAD Sep 9 00:40:54.737000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2713 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:54.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333165353736633666343036323035613363366664633638393735 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.739000 audit: BPF prog-id=127 op=LOAD Sep 9 00:40:54.739000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2713 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:54.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333165353736633666343036323035613363366664633638393735 Sep 9 00:40:54.741000 audit: BPF prog-id=127 op=UNLOAD Sep 9 00:40:54.741000 audit: BPF prog-id=126 op=UNLOAD Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:40:54.741000 audit: BPF prog-id=128 op=LOAD Sep 9 00:40:54.741000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2713 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:54.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333165353736633666343036323035613363366664633638393735 Sep 9 00:40:54.768429 env[1213]: time="2025-09-09T00:40:54.767679508Z" level=info msg="StartContainer for \"e931e576c6f406205a3c6fdc689753411bbbcd98d28b9746c64cb23dc2faf9c5\" returns successfully" Sep 9 00:40:54.821426 kubelet[1454]: E0909 00:40:54.821362 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:54.827000 audit[2786]: AVC avc: denied { search } for pid=2786 comm="rpcbind" name="crypto" dev="proc" ino=16831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 9 00:40:54.827000 audit[2786]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff83a9f000 a2=0 a3=0 items=0 ppid=2768 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 key=(null) Sep 9 00:40:54.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 9 00:40:54.862000 audit[2791]: AVC avc: denied { search } for pid=2791 comm="dbus-daemon" name="crypto" dev="proc" ino=16831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 9 00:40:54.862000 audit[2791]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8123f000 a2=0 a3=0 items=0 ppid=2768 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 key=(null) Sep 9 00:40:54.862000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 9 00:40:54.866000 audit[2792]: AVC avc: denied { watch } for pid=2792 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c626,c826 tclass=dir permissive=0 Sep 9 00:40:54.866000 audit[2792]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaacd1e7c20 a2=2c8 a3=aaaacd1d8a60 items=0 ppid=2768 pid=2792 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 key=(null) Sep 9 00:40:54.866000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 9 00:40:54.871000 audit[2793]: AVC avc: denied { read } for pid=2793 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18473 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 9 00:40:54.871000 audit[2793]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb9aea570 a2=80000 a3=0 items=0 ppid=2768 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 key=(null) Sep 9 00:40:54.871000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 9 00:40:54.872000 audit[2793]: AVC avc: denied { search } for pid=2793 comm="ganesha.nfsd" name="crypto" dev="proc" ino=16831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 9 00:40:54.872000 audit[2793]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb8e7f000 a2=0 a3=0 items=0 ppid=2768 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c826 key=(null) Sep 9 00:40:54.872000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 9 00:40:55.056000 audit[2813]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:55.056000 audit[2813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff144a890 a2=0 a3=1 items=0 ppid=1682 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:55.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:55.066000 audit[2813]: NETFILTER_CFG table=nat:81 family=2 entries=110 op=nft_register_chain pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:55.066000 audit[2813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=fffff144a890 a2=0 a3=1 items=0 ppid=1682 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:55.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:55.821684 kubelet[1454]: E0909 00:40:55.821642 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:56.822719 kubelet[1454]: E0909 00:40:56.822202 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:57.822797 kubelet[1454]: E0909 00:40:57.822761 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:58.225000 audit[2821]: NETFILTER_CFG table=filter:82 family=2 entries=8 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:58.225000 audit[2821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc5ab0da0 a2=0 a3=1 items=0 ppid=1682 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:58.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:58.235000 audit[2821]: NETFILTER_CFG table=nat:83 family=2 entries=62 op=nft_register_chain pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:40:58.235000 audit[2821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21988 a0=3 a1=ffffc5ab0da0 a2=0 a3=1 items=0 ppid=1682 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:40:58.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:40:58.824241 kubelet[1454]: E0909 00:40:58.824202 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:40:59.016797 update_engine[1205]: I0909 00:40:59.016414 1205 update_attempter.cc:509] Updating boot flags... Sep 9 00:40:59.824975 kubelet[1454]: E0909 00:40:59.824919 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:00.825890 kubelet[1454]: E0909 00:41:00.825828 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:01.799947 kubelet[1454]: E0909 00:41:01.799907 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:01.826413 kubelet[1454]: E0909 00:41:01.826372 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:02.827814 kubelet[1454]: E0909 00:41:02.827767 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:03.827924 kubelet[1454]: E0909 00:41:03.827878 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:04.617496 kubelet[1454]: I0909 00:41:04.617434 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=10.775458227 podStartE2EDuration="14.617416653s" podCreationTimestamp="2025-09-09 00:40:50 +0000 UTC" firstStartedPulling="2025-09-09 00:40:50.839177986 +0000 UTC m=+30.202839164" lastFinishedPulling="2025-09-09 00:40:54.681136412 +0000 UTC m=+34.044797590" observedRunningTime="2025-09-09 00:40:55.047292714 +0000 UTC m=+34.410953892" watchObservedRunningTime="2025-09-09 00:41:04.617416653 +0000 UTC m=+43.981077831" Sep 9 00:41:04.622641 systemd[1]: Created slice kubepods-besteffort-podcb1db2bb_0237_4068_b409_a73c1d287dd5.slice. Sep 9 00:41:04.773298 kubelet[1454]: I0909 00:41:04.773066 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f627d188-0bac-4bd7-9baf-5da48246ae9c\" (UniqueName: \"kubernetes.io/nfs/cb1db2bb-0237-4068-b409-a73c1d287dd5-pvc-f627d188-0bac-4bd7-9baf-5da48246ae9c\") pod \"test-pod-1\" (UID: \"cb1db2bb-0237-4068-b409-a73c1d287dd5\") " pod="default/test-pod-1" Sep 9 00:41:04.773298 kubelet[1454]: I0909 00:41:04.773117 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8g78m\" (UniqueName: \"kubernetes.io/projected/cb1db2bb-0237-4068-b409-a73c1d287dd5-kube-api-access-8g78m\") pod \"test-pod-1\" (UID: \"cb1db2bb-0237-4068-b409-a73c1d287dd5\") " pod="default/test-pod-1" Sep 9 00:41:04.828252 kubelet[1454]: E0909 00:41:04.828211 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:04.885550 kernel: Failed to create system directory netfs Sep 9 00:41:04.885658 kernel: Failed to create system directory netfs Sep 9 00:41:04.886868 kernel: Failed to create system directory netfs Sep 9 00:41:04.886934 kernel: kauditd_printk_skb: 74 callbacks suppressed Sep 9 00:41:04.886955 kernel: audit: type=1400 audit(1757378464.882:761): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.882000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.889066 kernel: Failed to create system directory netfs Sep 9 00:41:04.889166 kernel: audit: type=1400 audit(1757378464.882:761): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.889191 kernel: audit: type=1400 audit(1757378464.882:761): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.889208 kernel: audit: type=1400 audit(1757378464.882:761): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.882000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.882000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.882000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.882000 audit[2848]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1e44d5e0 a1=12c14 a2=aaaae129e028 a3=aaab1e43e010 items=0 ppid=82 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:04.896410 kernel: audit: type=1300 audit(1757378464.882:761): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1e44d5e0 a1=12c14 a2=aaaae129e028 a3=aaab1e43e010 items=0 ppid=82 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:04.882000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:41:04.900351 kernel: audit: type=1327 audit(1757378464.882:761): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.905339 kernel: Failed to create system directory fscache Sep 9 00:41:04.905453 kernel: audit: type=1400 audit(1757378464.898:762): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.905498 kernel: Failed to create system directory fscache Sep 9 00:41:04.905534 kernel: audit: type=1400 audit(1757378464.898:762): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.908420 kernel: Failed to create system directory fscache Sep 9 00:41:04.908455 kernel: audit: type=1400 audit(1757378464.898:762): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.908473 kernel: Failed to create system directory fscache Sep 9 00:41:04.910527 kernel: audit: type=1400 audit(1757378464.898:762): avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.913036 kernel: Failed to create system directory fscache Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.914822 kernel: Failed to create system directory fscache Sep 9 00:41:04.914843 kernel: Failed to create system directory fscache Sep 9 00:41:04.914870 kernel: Failed to create system directory fscache Sep 9 00:41:04.914885 kernel: Failed to create system directory fscache Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.915730 kernel: Failed to create system directory fscache Sep 9 00:41:04.915754 kernel: Failed to create system directory fscache Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.916629 kernel: Failed to create system directory fscache Sep 9 00:41:04.916650 kernel: Failed to create system directory fscache Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.898000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.917514 kernel: Failed to create system directory fscache Sep 9 00:41:04.918440 kernel: FS-Cache: Loaded Sep 9 00:41:04.898000 audit[2848]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1e660210 a1=4c344 a2=aaaae129e028 a3=aaab1e43e010 items=0 ppid=82 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:04.898000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.940505 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.940543 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.940561 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.941869 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.941898 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.941912 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.942765 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.943828 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.943851 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.943876 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.944737 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.944758 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.945623 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.945643 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.946491 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.946511 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.947816 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.947832 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.947849 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.948707 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.948724 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.949580 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.949604 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.950437 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.950453 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.951842 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.951864 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.951878 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.952759 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.952779 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.953644 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.953662 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.954515 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.954535 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.955852 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.955872 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.955886 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.956750 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.956770 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.957658 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.957678 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.958531 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.958551 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.959871 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.959887 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.959905 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.960774 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.960796 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.961654 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.961678 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.962524 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.962549 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.963856 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.963879 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.963893 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.964754 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.964779 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.965632 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.965654 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.966493 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.966509 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.967821 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.967838 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.967857 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.968714 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.968736 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.969591 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.969608 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.970450 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.970466 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.971772 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.971795 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.971814 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.972655 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.972677 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.973531 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.973549 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.974865 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.974882 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.974904 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.975759 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.975782 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.976644 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.976661 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.977517 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.977538 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.978841 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.978858 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.978871 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.979737 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.979754 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.980613 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.980629 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.981472 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.981491 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.982862 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.982879 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.982891 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.984568 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.984594 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.985523 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.985549 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.986882 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.986903 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.986917 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.987799 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.987817 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.988701 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.988718 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.989584 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.989600 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.990461 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.990482 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.991786 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.991807 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.991829 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.992682 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.992702 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.993560 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.993580 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.994410 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.994435 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.995732 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.995753 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.995767 kernel: Failed to create system directory sunrpc Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.931000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:04.996611 kernel: Failed to create system directory sunrpc Sep 9 00:41:05.002442 kernel: RPC: Registered named UNIX socket transport module. Sep 9 00:41:05.002487 kernel: RPC: Registered udp transport module. Sep 9 00:41:05.002528 kernel: RPC: Registered tcp transport module. Sep 9 00:41:05.002562 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 9 00:41:04.931000 audit[2848]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1e6ac560 a1=14a74c a2=aaaae129e028 a3=aaab1e43e010 items=6 ppid=82 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:04.931000 audit: CWD cwd="/" Sep 9 00:41:04.931000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:41:04.931000 audit: PATH item=1 name=(null) inode=16976 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:41:04.931000 audit: PATH item=2 name=(null) inode=16976 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:41:04.931000 audit: PATH item=3 name=(null) inode=16977 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:41:04.931000 audit: PATH item=4 name=(null) inode=16976 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:41:04.931000 audit: PATH item=5 name=(null) inode=16978 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:41:04.931000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.029594 kernel: Failed to create system directory nfs Sep 9 00:41:05.029621 kernel: Failed to create system directory nfs Sep 9 00:41:05.029635 kernel: Failed to create system directory nfs Sep 9 00:41:05.029660 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.030407 kernel: Failed to create system directory nfs Sep 9 00:41:05.030426 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.031657 kernel: Failed to create system directory nfs Sep 9 00:41:05.031674 kernel: Failed to create system directory nfs Sep 9 00:41:05.031686 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.032481 kernel: Failed to create system directory nfs Sep 9 00:41:05.032497 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.033734 kernel: Failed to create system directory nfs Sep 9 00:41:05.033758 kernel: Failed to create system directory nfs Sep 9 00:41:05.033774 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.034566 kernel: Failed to create system directory nfs Sep 9 00:41:05.034582 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.035843 kernel: Failed to create system directory nfs Sep 9 00:41:05.035858 kernel: Failed to create system directory nfs Sep 9 00:41:05.035871 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.036697 kernel: Failed to create system directory nfs Sep 9 00:41:05.036715 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.037528 kernel: Failed to create system directory nfs Sep 9 00:41:05.037547 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.038797 kernel: Failed to create system directory nfs Sep 9 00:41:05.038818 kernel: Failed to create system directory nfs Sep 9 00:41:05.038831 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.039639 kernel: Failed to create system directory nfs Sep 9 00:41:05.039662 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.040456 kernel: Failed to create system directory nfs Sep 9 00:41:05.040472 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.041708 kernel: Failed to create system directory nfs Sep 9 00:41:05.041729 kernel: Failed to create system directory nfs Sep 9 00:41:05.041744 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.042539 kernel: Failed to create system directory nfs Sep 9 00:41:05.042560 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.043810 kernel: Failed to create system directory nfs Sep 9 00:41:05.043827 kernel: Failed to create system directory nfs Sep 9 00:41:05.043840 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.044655 kernel: Failed to create system directory nfs Sep 9 00:41:05.044672 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.045553 kernel: Failed to create system directory nfs Sep 9 00:41:05.045570 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.046835 kernel: Failed to create system directory nfs Sep 9 00:41:05.046852 kernel: Failed to create system directory nfs Sep 9 00:41:05.046865 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.047687 kernel: Failed to create system directory nfs Sep 9 00:41:05.047708 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.048515 kernel: Failed to create system directory nfs Sep 9 00:41:05.048531 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.049783 kernel: Failed to create system directory nfs Sep 9 00:41:05.049804 kernel: Failed to create system directory nfs Sep 9 00:41:05.049818 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.050631 kernel: Failed to create system directory nfs Sep 9 00:41:05.050647 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.051924 kernel: Failed to create system directory nfs Sep 9 00:41:05.051950 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.052808 kernel: Failed to create system directory nfs Sep 9 00:41:05.052827 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.053712 kernel: Failed to create system directory nfs Sep 9 00:41:05.053747 kernel: Failed to create system directory nfs Sep 9 00:41:05.022000 audit[2848]: AVC avc: denied { confidentiality } for pid=2848 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.022000 audit[2848]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1e855a40 a1=11624c a2=aaaae129e028 a3=aaab1e43e010 items=0 ppid=82 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.022000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:41:05.069411 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.097785 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.097822 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.097840 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.097855 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.097869 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.098820 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.099837 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.099859 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.100397 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.100417 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.101815 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.101848 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.101863 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.102732 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.103657 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.103685 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.103701 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.104605 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.105507 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.105536 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.106401 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.106425 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.107407 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.107442 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.107460 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.108769 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.108793 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.109686 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.109710 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.110603 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.110626 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.110640 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.111517 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.112503 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.112545 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.112562 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.113451 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.113484 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.114736 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.114762 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.115666 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.115689 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.116675 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.116697 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.117593 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.117618 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.118526 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.118583 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.118601 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.119467 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.120845 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.120904 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.120926 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.120940 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.121847 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.122849 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.122876 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.123788 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.123805 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.124722 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.124738 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.124756 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.125614 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.126500 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.126517 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.127402 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.127450 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.127469 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.128776 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.128814 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.128831 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.129744 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.129769 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.130621 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.130645 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.131513 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.131538 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.132871 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.132895 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.132910 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.133770 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.133879 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.134682 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.135647 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.135671 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.135694 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.136506 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.136558 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.137400 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.137436 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.139149 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.139208 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.139224 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.139713 kernel: Failed to create system directory nfs4 Sep 9 00:41:05.088000 audit[2854]: AVC avc: denied { confidentiality } for pid=2854 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.240594 kernel: NFS: Registering the id_resolver key type Sep 9 00:41:05.240685 kernel: Key type id_resolver registered Sep 9 00:41:05.240701 kernel: Key type id_legacy registered Sep 9 00:41:05.088000 audit[2854]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8582a010 a1=19c6dc a2=aaaad87ee028 a3=aaaaf0de6010 items=0 ppid=82 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.088000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.252652 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.252747 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.252771 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.253600 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.253631 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.254637 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.254702 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.255650 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.255685 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.256671 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.256707 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.257623 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.257657 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.258531 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.258557 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.259445 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.259470 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.260865 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.260889 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.260903 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.261877 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.261921 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.262923 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.262968 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.248000 audit[2855]: AVC avc: denied { confidentiality } for pid=2855 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:41:05.264428 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.264450 kernel: Failed to create system directory rpcgss Sep 9 00:41:05.248000 audit[2855]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff94472010 a1=5ee94 a2=aaaab3b8e028 a3=aaaab554d010 items=0 ppid=82 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.248000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 9 00:41:05.281852 nfsidmap[2864]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 9 00:41:05.285214 nfsidmap[2867]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 9 00:41:05.300000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:41:05.300000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaade864920 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.300000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 9 00:41:05.300000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:41:05.300000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:41:05.300000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaade864920 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.300000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:41:05.300000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 9 00:41:05.300000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:41:05.300000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:41:05.300000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaade864920 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.300000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 9 00:41:05.526587 env[1213]: time="2025-09-09T00:41:05.526290005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:cb1db2bb-0237-4068-b409-a73c1d287dd5,Namespace:default,Attempt:0,}" Sep 9 00:41:05.744850 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:41:05.745025 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 9 00:41:05.742604 systemd-networkd[1052]: cali5ec59c6bf6e: Link UP Sep 9 00:41:05.744851 systemd-networkd[1052]: cali5ec59c6bf6e: Gained carrier Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.680 [INFO][2875] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.107-k8s-test--pod--1-eth0 default cb1db2bb-0237-4068-b409-a73c1d287dd5 1397 0 2025-09-09 00:40:50 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.107 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.681 [INFO][2875] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-eth0" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.704 [INFO][2886] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" HandleID="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Workload="10.0.0.107-k8s-test--pod--1-eth0" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.704 [INFO][2886] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" HandleID="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Workload="10.0.0.107-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001376f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.107", "pod":"test-pod-1", "timestamp":"2025-09-09 00:41:05.704795766 +0000 UTC"}, Hostname:"10.0.0.107", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.705 [INFO][2886] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.705 [INFO][2886] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.705 [INFO][2886] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.107' Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.714 [INFO][2886] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.719 [INFO][2886] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.723 [INFO][2886] ipam/ipam.go 511: Trying affinity for 192.168.117.0/26 host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.725 [INFO][2886] ipam/ipam.go 158: Attempting to load block cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.727 [INFO][2886] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.117.0/26 host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.727 [INFO][2886] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.117.0/26 handle="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.729 [INFO][2886] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.733 [INFO][2886] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.117.0/26 handle="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.738 [INFO][2886] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.117.4/26] block=192.168.117.0/26 handle="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.738 [INFO][2886] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.117.4/26] handle="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" host="10.0.0.107" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.738 [INFO][2886] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.738 [INFO][2886] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.117.4/26] IPv6=[] ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" HandleID="k8s-pod-network.ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Workload="10.0.0.107-k8s-test--pod--1-eth0" Sep 9 00:41:05.758378 env[1213]: 2025-09-09 00:41:05.739 [INFO][2875] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"cb1db2bb-0237-4068-b409-a73c1d287dd5", ResourceVersion:"1397", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:41:05.759439 env[1213]: 2025-09-09 00:41:05.740 [INFO][2875] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.117.4/32] ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-eth0" Sep 9 00:41:05.759439 env[1213]: 2025-09-09 00:41:05.740 [INFO][2875] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-eth0" Sep 9 00:41:05.759439 env[1213]: 2025-09-09 00:41:05.745 [INFO][2875] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-eth0" Sep 9 00:41:05.759439 env[1213]: 2025-09-09 00:41:05.745 [INFO][2875] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.107-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"cb1db2bb-0237-4068-b409-a73c1d287dd5", ResourceVersion:"1397", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 40, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.107", ContainerID:"ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.117.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"a6:b7:84:4d:ae:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:41:05.759439 env[1213]: 2025-09-09 00:41:05.753 [INFO][2875] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.107-k8s-test--pod--1-eth0" Sep 9 00:41:05.768000 audit[2903]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:41:05.768000 audit[2903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffe308cd80 a2=0 a3=ffff926ebfa8 items=0 ppid=2120 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:41:05.773857 env[1213]: time="2025-09-09T00:41:05.773791534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:41:05.773857 env[1213]: time="2025-09-09T00:41:05.773837831Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:41:05.773857 env[1213]: time="2025-09-09T00:41:05.773848274Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:41:05.774131 env[1213]: time="2025-09-09T00:41:05.774102006Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c pid=2912 runtime=io.containerd.runc.v2 Sep 9 00:41:05.785798 systemd[1]: Started cri-containerd-ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c.scope. Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.802000 audit: BPF prog-id=129 op=LOAD Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2912 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353635653630353563366461313233666138353039623436663064 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2912 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353635653630353563366461313233666138353039623436663064 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit: BPF prog-id=130 op=LOAD Sep 9 00:41:05.803000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2912 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353635653630353563366461313233666138353039623436663064 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit: BPF prog-id=131 op=LOAD Sep 9 00:41:05.803000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2912 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353635653630353563366461313233666138353039623436663064 Sep 9 00:41:05.803000 audit: BPF prog-id=131 op=UNLOAD Sep 9 00:41:05.803000 audit: BPF prog-id=130 op=UNLOAD Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:05.803000 audit: BPF prog-id=132 op=LOAD Sep 9 00:41:05.803000 audit[2922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2912 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:05.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353635653630353563366461313233666138353039623436663064 Sep 9 00:41:05.805418 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:41:05.824433 env[1213]: time="2025-09-09T00:41:05.824353845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:cb1db2bb-0237-4068-b409-a73c1d287dd5,Namespace:default,Attempt:0,} returns sandbox id \"ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c\"" Sep 9 00:41:05.825578 env[1213]: time="2025-09-09T00:41:05.825544593Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 9 00:41:05.829106 kubelet[1454]: E0909 00:41:05.829065 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:06.107521 env[1213]: time="2025-09-09T00:41:06.107460473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:41:06.109275 env[1213]: time="2025-09-09T00:41:06.109239564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:41:06.111280 env[1213]: time="2025-09-09T00:41:06.111250174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:41:06.113873 env[1213]: time="2025-09-09T00:41:06.113820897Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:41:06.114178 env[1213]: time="2025-09-09T00:41:06.114145528Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 9 00:41:06.120622 env[1213]: time="2025-09-09T00:41:06.120580817Z" level=info msg="CreateContainer within sandbox \"ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 9 00:41:06.133642 env[1213]: time="2025-09-09T00:41:06.133595164Z" level=info msg="CreateContainer within sandbox \"ec565e6055c6da123fa8509b46f0daab87f1be6470fb998bcd80dd9c7e77fa4c\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"66529d8bcaa5ce6d3ef7499795be08894fe5c7c17df7c8fa323340624bb7bff5\"" Sep 9 00:41:06.134366 env[1213]: time="2025-09-09T00:41:06.134309850Z" level=info msg="StartContainer for \"66529d8bcaa5ce6d3ef7499795be08894fe5c7c17df7c8fa323340624bb7bff5\"" Sep 9 00:41:06.154505 systemd[1]: Started cri-containerd-66529d8bcaa5ce6d3ef7499795be08894fe5c7c17df7c8fa323340624bb7bff5.scope. Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit: BPF prog-id=133 op=LOAD Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2912 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:06.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353239643862636161356365366433656637343939373935626530 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2912 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:06.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353239643862636161356365366433656637343939373935626530 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.172000 audit: BPF prog-id=134 op=LOAD Sep 9 00:41:06.172000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2912 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:06.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353239643862636161356365366433656637343939373935626530 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.173000 audit: BPF prog-id=135 op=LOAD Sep 9 00:41:06.173000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2912 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:06.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353239643862636161356365366433656637343939373935626530 Sep 9 00:41:06.174000 audit: BPF prog-id=135 op=UNLOAD Sep 9 00:41:06.174000 audit: BPF prog-id=134 op=UNLOAD Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:41:06.174000 audit: BPF prog-id=136 op=LOAD Sep 9 00:41:06.174000 audit[2952]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2912 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:41:06.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636353239643862636161356365366433656637343939373935626530 Sep 9 00:41:06.189220 env[1213]: time="2025-09-09T00:41:06.189162038Z" level=info msg="StartContainer for \"66529d8bcaa5ce6d3ef7499795be08894fe5c7c17df7c8fa323340624bb7bff5\" returns successfully" Sep 9 00:41:06.829720 kubelet[1454]: E0909 00:41:06.829663 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:07.547423 systemd-networkd[1052]: cali5ec59c6bf6e: Gained IPv6LL Sep 9 00:41:07.830581 kubelet[1454]: E0909 00:41:07.830517 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:08.020654 systemd[1]: run-containerd-runc-k8s.io-5bdb993589ba0aee9b9165ec3faf188ffd0fefe9d63fb209fa3cc677d23f75c2-runc.leM8YJ.mount: Deactivated successfully. Sep 9 00:41:08.124169 kubelet[1454]: I0909 00:41:08.123878 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=17.833511894 podStartE2EDuration="18.123854193s" podCreationTimestamp="2025-09-09 00:40:50 +0000 UTC" firstStartedPulling="2025-09-09 00:41:05.825189345 +0000 UTC m=+45.188850523" lastFinishedPulling="2025-09-09 00:41:06.115531644 +0000 UTC m=+45.479192822" observedRunningTime="2025-09-09 00:41:07.078261612 +0000 UTC m=+46.441922790" watchObservedRunningTime="2025-09-09 00:41:08.123854193 +0000 UTC m=+47.487515371" Sep 9 00:41:08.831892 kubelet[1454]: E0909 00:41:08.831647 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:09.832660 kubelet[1454]: E0909 00:41:09.832489 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:10.833558 kubelet[1454]: E0909 00:41:10.833519 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:11.834940 kubelet[1454]: E0909 00:41:11.834866 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:41:12.835175 kubelet[1454]: E0909 00:41:12.835130 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"