Sep 9 00:33:24.707350 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Sep 9 00:33:24.707372 kernel: Linux version 5.15.191-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Sep 8 23:23:23 -00 2025 Sep 9 00:33:24.707380 kernel: efi: EFI v2.70 by EDK II Sep 9 00:33:24.707386 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Sep 9 00:33:24.707391 kernel: random: crng init done Sep 9 00:33:24.707397 kernel: ACPI: Early table checksum verification disabled Sep 9 00:33:24.707403 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Sep 9 00:33:24.707410 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Sep 9 00:33:24.707416 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707421 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707427 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707433 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707438 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707444 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707452 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707458 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707464 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 9 00:33:24.707470 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Sep 9 00:33:24.707475 kernel: NUMA: Failed to initialise from firmware Sep 9 00:33:24.707481 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Sep 9 00:33:24.707487 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Sep 9 00:33:24.707493 kernel: Zone ranges: Sep 9 00:33:24.707498 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Sep 9 00:33:24.707505 kernel: DMA32 empty Sep 9 00:33:24.707511 kernel: Normal empty Sep 9 00:33:24.707517 kernel: Movable zone start for each node Sep 9 00:33:24.707522 kernel: Early memory node ranges Sep 9 00:33:24.707528 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Sep 9 00:33:24.707534 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Sep 9 00:33:24.707539 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Sep 9 00:33:24.707545 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Sep 9 00:33:24.707552 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Sep 9 00:33:24.707558 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Sep 9 00:33:24.707564 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Sep 9 00:33:24.707570 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Sep 9 00:33:24.707577 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Sep 9 00:33:24.707582 kernel: psci: probing for conduit method from ACPI. Sep 9 00:33:24.707588 kernel: psci: PSCIv1.1 detected in firmware. Sep 9 00:33:24.707594 kernel: psci: Using standard PSCI v0.2 function IDs Sep 9 00:33:24.707600 kernel: psci: Trusted OS migration not required Sep 9 00:33:24.707608 kernel: psci: SMC Calling Convention v1.1 Sep 9 00:33:24.707614 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Sep 9 00:33:24.707622 kernel: ACPI: SRAT not present Sep 9 00:33:24.707628 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Sep 9 00:33:24.707634 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Sep 9 00:33:24.707640 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Sep 9 00:33:24.707647 kernel: Detected PIPT I-cache on CPU0 Sep 9 00:33:24.707653 kernel: CPU features: detected: GIC system register CPU interface Sep 9 00:33:24.707659 kernel: CPU features: detected: Hardware dirty bit management Sep 9 00:33:24.707665 kernel: CPU features: detected: Spectre-v4 Sep 9 00:33:24.707671 kernel: CPU features: detected: Spectre-BHB Sep 9 00:33:24.707679 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 9 00:33:24.707685 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 9 00:33:24.707691 kernel: CPU features: detected: ARM erratum 1418040 Sep 9 00:33:24.707697 kernel: CPU features: detected: SSBS not fully self-synchronizing Sep 9 00:33:24.707703 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Sep 9 00:33:24.707709 kernel: Policy zone: DMA Sep 9 00:33:24.707717 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=32b3b664430ec28e33efa673a32f74eb733fc8145822fbe5ce810188f7f71923 Sep 9 00:33:24.707723 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 9 00:33:24.707730 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 9 00:33:24.707736 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 9 00:33:24.707742 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 9 00:33:24.707750 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 114948K reserved, 0K cma-reserved) Sep 9 00:33:24.707757 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Sep 9 00:33:24.707763 kernel: trace event string verifier disabled Sep 9 00:33:24.707779 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 9 00:33:24.707787 kernel: rcu: RCU event tracing is enabled. Sep 9 00:33:24.707793 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Sep 9 00:33:24.707800 kernel: Trampoline variant of Tasks RCU enabled. Sep 9 00:33:24.707806 kernel: Tracing variant of Tasks RCU enabled. Sep 9 00:33:24.707813 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 9 00:33:24.707819 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Sep 9 00:33:24.707830 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 9 00:33:24.707839 kernel: GICv3: 256 SPIs implemented Sep 9 00:33:24.707845 kernel: GICv3: 0 Extended SPIs implemented Sep 9 00:33:24.707851 kernel: GICv3: Distributor has no Range Selector support Sep 9 00:33:24.707857 kernel: Root IRQ handler: gic_handle_irq Sep 9 00:33:24.707863 kernel: GICv3: 16 PPIs implemented Sep 9 00:33:24.707869 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Sep 9 00:33:24.707876 kernel: ACPI: SRAT not present Sep 9 00:33:24.707882 kernel: ITS [mem 0x08080000-0x0809ffff] Sep 9 00:33:24.707888 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Sep 9 00:33:24.707894 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Sep 9 00:33:24.707901 kernel: GICv3: using LPI property table @0x00000000400d0000 Sep 9 00:33:24.707907 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Sep 9 00:33:24.707914 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:33:24.707920 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Sep 9 00:33:24.707927 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Sep 9 00:33:24.707933 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Sep 9 00:33:24.707939 kernel: arm-pv: using stolen time PV Sep 9 00:33:24.707946 kernel: Console: colour dummy device 80x25 Sep 9 00:33:24.707953 kernel: ACPI: Core revision 20210730 Sep 9 00:33:24.707959 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Sep 9 00:33:24.707965 kernel: pid_max: default: 32768 minimum: 301 Sep 9 00:33:24.707972 kernel: LSM: Security Framework initializing Sep 9 00:33:24.707980 kernel: SELinux: Initializing. Sep 9 00:33:24.707986 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 9 00:33:24.707992 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 9 00:33:24.707998 kernel: rcu: Hierarchical SRCU implementation. Sep 9 00:33:24.708005 kernel: Platform MSI: ITS@0x8080000 domain created Sep 9 00:33:24.708011 kernel: PCI/MSI: ITS@0x8080000 domain created Sep 9 00:33:24.708017 kernel: Remapping and enabling EFI services. Sep 9 00:33:24.708024 kernel: smp: Bringing up secondary CPUs ... Sep 9 00:33:24.708030 kernel: Detected PIPT I-cache on CPU1 Sep 9 00:33:24.708038 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Sep 9 00:33:24.708044 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Sep 9 00:33:24.708051 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:33:24.708057 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Sep 9 00:33:24.708063 kernel: Detected PIPT I-cache on CPU2 Sep 9 00:33:24.708070 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Sep 9 00:33:24.708076 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Sep 9 00:33:24.708083 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:33:24.708089 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Sep 9 00:33:24.708095 kernel: Detected PIPT I-cache on CPU3 Sep 9 00:33:24.708103 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Sep 9 00:33:24.708110 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Sep 9 00:33:24.708116 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 9 00:33:24.708122 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Sep 9 00:33:24.708133 kernel: smp: Brought up 1 node, 4 CPUs Sep 9 00:33:24.708141 kernel: SMP: Total of 4 processors activated. Sep 9 00:33:24.708147 kernel: CPU features: detected: 32-bit EL0 Support Sep 9 00:33:24.708154 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Sep 9 00:33:24.708160 kernel: CPU features: detected: Common not Private translations Sep 9 00:33:24.708167 kernel: CPU features: detected: CRC32 instructions Sep 9 00:33:24.708173 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Sep 9 00:33:24.708180 kernel: CPU features: detected: LSE atomic instructions Sep 9 00:33:24.708188 kernel: CPU features: detected: Privileged Access Never Sep 9 00:33:24.708195 kernel: CPU features: detected: RAS Extension Support Sep 9 00:33:24.708202 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Sep 9 00:33:24.708208 kernel: CPU: All CPU(s) started at EL1 Sep 9 00:33:24.708216 kernel: alternatives: patching kernel code Sep 9 00:33:24.708225 kernel: devtmpfs: initialized Sep 9 00:33:24.708232 kernel: KASLR enabled Sep 9 00:33:24.708239 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 9 00:33:24.708246 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Sep 9 00:33:24.708252 kernel: pinctrl core: initialized pinctrl subsystem Sep 9 00:33:24.708259 kernel: SMBIOS 3.0.0 present. Sep 9 00:33:24.708266 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Sep 9 00:33:24.708274 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 9 00:33:24.708281 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 9 00:33:24.708290 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 9 00:33:24.708299 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 9 00:33:24.708306 kernel: audit: initializing netlink subsys (disabled) Sep 9 00:33:24.708313 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 Sep 9 00:33:24.708321 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 9 00:33:24.708327 kernel: cpuidle: using governor menu Sep 9 00:33:24.708334 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 9 00:33:24.708340 kernel: ASID allocator initialised with 32768 entries Sep 9 00:33:24.708347 kernel: ACPI: bus type PCI registered Sep 9 00:33:24.708355 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 9 00:33:24.708361 kernel: Serial: AMBA PL011 UART driver Sep 9 00:33:24.708368 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 9 00:33:24.708375 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 9 00:33:24.708381 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 9 00:33:24.708388 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 9 00:33:24.708395 kernel: cryptd: max_cpu_qlen set to 1000 Sep 9 00:33:24.708401 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 9 00:33:24.708408 kernel: ACPI: Added _OSI(Module Device) Sep 9 00:33:24.708416 kernel: ACPI: Added _OSI(Processor Device) Sep 9 00:33:24.708423 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 9 00:33:24.708429 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 9 00:33:24.708436 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 9 00:33:24.708442 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 9 00:33:24.708449 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 9 00:33:24.708455 kernel: ACPI: Interpreter enabled Sep 9 00:33:24.708462 kernel: ACPI: Using GIC for interrupt routing Sep 9 00:33:24.708468 kernel: ACPI: MCFG table detected, 1 entries Sep 9 00:33:24.708476 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Sep 9 00:33:24.708484 kernel: printk: console [ttyAMA0] enabled Sep 9 00:33:24.708490 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 9 00:33:24.708633 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 9 00:33:24.708705 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 9 00:33:24.708778 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 9 00:33:24.708849 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Sep 9 00:33:24.708940 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Sep 9 00:33:24.709557 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Sep 9 00:33:24.709578 kernel: PCI host bridge to bus 0000:00 Sep 9 00:33:24.709687 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Sep 9 00:33:24.709745 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Sep 9 00:33:24.709842 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Sep 9 00:33:24.709899 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 9 00:33:24.709978 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Sep 9 00:33:24.710046 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Sep 9 00:33:24.710107 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Sep 9 00:33:24.710167 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Sep 9 00:33:24.710230 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Sep 9 00:33:24.710303 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Sep 9 00:33:24.710371 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Sep 9 00:33:24.710440 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Sep 9 00:33:24.710531 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Sep 9 00:33:24.710594 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Sep 9 00:33:24.710653 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Sep 9 00:33:24.710662 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Sep 9 00:33:24.710669 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Sep 9 00:33:24.710676 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Sep 9 00:33:24.710683 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Sep 9 00:33:24.710692 kernel: iommu: Default domain type: Translated Sep 9 00:33:24.710698 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 9 00:33:24.710705 kernel: vgaarb: loaded Sep 9 00:33:24.710712 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 9 00:33:24.710719 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 9 00:33:24.710725 kernel: PTP clock support registered Sep 9 00:33:24.710732 kernel: Registered efivars operations Sep 9 00:33:24.710739 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 9 00:33:24.710746 kernel: VFS: Disk quotas dquot_6.6.0 Sep 9 00:33:24.710755 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 9 00:33:24.710761 kernel: pnp: PnP ACPI init Sep 9 00:33:24.710852 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Sep 9 00:33:24.710863 kernel: pnp: PnP ACPI: found 1 devices Sep 9 00:33:24.710870 kernel: NET: Registered PF_INET protocol family Sep 9 00:33:24.710876 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 9 00:33:24.710883 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 9 00:33:24.710890 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 9 00:33:24.710899 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 9 00:33:24.710906 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 9 00:33:24.710913 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 9 00:33:24.710920 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 9 00:33:24.710926 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 9 00:33:24.710933 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 9 00:33:24.710954 kernel: PCI: CLS 0 bytes, default 64 Sep 9 00:33:24.710961 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Sep 9 00:33:24.710967 kernel: kvm [1]: HYP mode not available Sep 9 00:33:24.710975 kernel: Initialise system trusted keyrings Sep 9 00:33:24.710982 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 9 00:33:24.710988 kernel: Key type asymmetric registered Sep 9 00:33:24.710995 kernel: Asymmetric key parser 'x509' registered Sep 9 00:33:24.711002 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 9 00:33:24.711009 kernel: io scheduler mq-deadline registered Sep 9 00:33:24.711016 kernel: io scheduler kyber registered Sep 9 00:33:24.711022 kernel: io scheduler bfq registered Sep 9 00:33:24.711029 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Sep 9 00:33:24.711037 kernel: ACPI: button: Power Button [PWRB] Sep 9 00:33:24.711045 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Sep 9 00:33:24.711113 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Sep 9 00:33:24.711122 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 9 00:33:24.711129 kernel: thunder_xcv, ver 1.0 Sep 9 00:33:24.711135 kernel: thunder_bgx, ver 1.0 Sep 9 00:33:24.711142 kernel: nicpf, ver 1.0 Sep 9 00:33:24.711149 kernel: nicvf, ver 1.0 Sep 9 00:33:24.711226 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 9 00:33:24.711291 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-09T00:33:24 UTC (1757378004) Sep 9 00:33:24.711300 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 9 00:33:24.711307 kernel: NET: Registered PF_INET6 protocol family Sep 9 00:33:24.711313 kernel: Segment Routing with IPv6 Sep 9 00:33:24.711320 kernel: In-situ OAM (IOAM) with IPv6 Sep 9 00:33:24.711327 kernel: NET: Registered PF_PACKET protocol family Sep 9 00:33:24.711333 kernel: Key type dns_resolver registered Sep 9 00:33:24.711340 kernel: registered taskstats version 1 Sep 9 00:33:24.711348 kernel: Loading compiled-in X.509 certificates Sep 9 00:33:24.711355 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.191-flatcar: 14b3f28443a1a4b809c7c0337ab8c3dc8fdb5252' Sep 9 00:33:24.711362 kernel: Key type .fscrypt registered Sep 9 00:33:24.711368 kernel: Key type fscrypt-provisioning registered Sep 9 00:33:24.711375 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 9 00:33:24.711382 kernel: ima: Allocated hash algorithm: sha1 Sep 9 00:33:24.711388 kernel: ima: No architecture policies found Sep 9 00:33:24.711395 kernel: clk: Disabling unused clocks Sep 9 00:33:24.711401 kernel: Freeing unused kernel memory: 36416K Sep 9 00:33:24.711409 kernel: Run /init as init process Sep 9 00:33:24.711416 kernel: with arguments: Sep 9 00:33:24.711423 kernel: /init Sep 9 00:33:24.711429 kernel: with environment: Sep 9 00:33:24.711436 kernel: HOME=/ Sep 9 00:33:24.711443 kernel: TERM=linux Sep 9 00:33:24.711449 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 9 00:33:24.711458 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 9 00:33:24.711468 systemd[1]: Detected virtualization kvm. Sep 9 00:33:24.711475 systemd[1]: Detected architecture arm64. Sep 9 00:33:24.711482 systemd[1]: Running in initrd. Sep 9 00:33:24.711489 systemd[1]: No hostname configured, using default hostname. Sep 9 00:33:24.711496 systemd[1]: Hostname set to . Sep 9 00:33:24.711503 systemd[1]: Initializing machine ID from VM UUID. Sep 9 00:33:24.711511 systemd[1]: Queued start job for default target initrd.target. Sep 9 00:33:24.711517 systemd[1]: Started systemd-ask-password-console.path. Sep 9 00:33:24.711526 systemd[1]: Reached target cryptsetup.target. Sep 9 00:33:24.711533 systemd[1]: Reached target paths.target. Sep 9 00:33:24.711540 systemd[1]: Reached target slices.target. Sep 9 00:33:24.711547 systemd[1]: Reached target swap.target. Sep 9 00:33:24.711554 systemd[1]: Reached target timers.target. Sep 9 00:33:24.711561 systemd[1]: Listening on iscsid.socket. Sep 9 00:33:24.711569 systemd[1]: Listening on iscsiuio.socket. Sep 9 00:33:24.711577 systemd[1]: Listening on systemd-journald-audit.socket. Sep 9 00:33:24.711585 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 9 00:33:24.711592 systemd[1]: Listening on systemd-journald.socket. Sep 9 00:33:24.711600 systemd[1]: Listening on systemd-networkd.socket. Sep 9 00:33:24.711607 systemd[1]: Listening on systemd-udevd-control.socket. Sep 9 00:33:24.711614 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 9 00:33:24.711622 systemd[1]: Reached target sockets.target. Sep 9 00:33:24.711629 systemd[1]: Starting kmod-static-nodes.service... Sep 9 00:33:24.711636 systemd[1]: Finished network-cleanup.service. Sep 9 00:33:24.711644 systemd[1]: Starting systemd-fsck-usr.service... Sep 9 00:33:24.711651 systemd[1]: Starting systemd-journald.service... Sep 9 00:33:24.711658 systemd[1]: Starting systemd-modules-load.service... Sep 9 00:33:24.711665 systemd[1]: Starting systemd-resolved.service... Sep 9 00:33:24.711673 systemd[1]: Starting systemd-vconsole-setup.service... Sep 9 00:33:24.711680 systemd[1]: Finished kmod-static-nodes.service. Sep 9 00:33:24.711687 systemd[1]: Finished systemd-fsck-usr.service. Sep 9 00:33:24.711694 kernel: audit: type=1130 audit(1757378004.705:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.711702 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 9 00:33:24.711714 systemd-journald[291]: Journal started Sep 9 00:33:24.711755 systemd-journald[291]: Runtime Journal (/run/log/journal/c868ce1281cd4df98e9ec590bb01f618) is 6.0M, max 48.7M, 42.6M free. Sep 9 00:33:24.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.717093 systemd[1]: Started systemd-journald.service. Sep 9 00:33:24.717130 kernel: audit: type=1130 audit(1757378004.712:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.717142 kernel: audit: type=1130 audit(1757378004.715:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.713020 systemd-modules-load[292]: Inserted module 'overlay' Sep 9 00:33:24.715993 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 9 00:33:24.719605 systemd[1]: Finished systemd-vconsole-setup.service. Sep 9 00:33:24.721553 systemd[1]: Starting dracut-cmdline-ask.service... Sep 9 00:33:24.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.725790 kernel: audit: type=1130 audit(1757378004.719:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.734888 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 9 00:33:24.735477 systemd-resolved[293]: Positive Trust Anchors: Sep 9 00:33:24.735492 systemd-resolved[293]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 9 00:33:24.735519 systemd-resolved[293]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 9 00:33:24.739871 systemd-resolved[293]: Defaulting to hostname 'linux'. Sep 9 00:33:24.745690 kernel: Bridge firewalling registered Sep 9 00:33:24.745711 kernel: audit: type=1130 audit(1757378004.742:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.740710 systemd[1]: Started systemd-resolved.service. Sep 9 00:33:24.742936 systemd-modules-load[292]: Inserted module 'br_netfilter' Sep 9 00:33:24.743014 systemd[1]: Reached target nss-lookup.target. Sep 9 00:33:24.747965 systemd[1]: Finished dracut-cmdline-ask.service. Sep 9 00:33:24.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.752241 systemd[1]: Starting dracut-cmdline.service... Sep 9 00:33:24.753852 kernel: audit: type=1130 audit(1757378004.748:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.756787 kernel: SCSI subsystem initialized Sep 9 00:33:24.761469 dracut-cmdline[309]: dracut-dracut-053 Sep 9 00:33:24.763819 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=32b3b664430ec28e33efa673a32f74eb733fc8145822fbe5ce810188f7f71923 Sep 9 00:33:24.769898 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 9 00:33:24.769919 kernel: device-mapper: uevent: version 1.0.3 Sep 9 00:33:24.769929 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 9 00:33:24.769814 systemd-modules-load[292]: Inserted module 'dm_multipath' Sep 9 00:33:24.770781 systemd[1]: Finished systemd-modules-load.service. Sep 9 00:33:24.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.772180 systemd[1]: Starting systemd-sysctl.service... Sep 9 00:33:24.775625 kernel: audit: type=1130 audit(1757378004.770:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.781157 systemd[1]: Finished systemd-sysctl.service. Sep 9 00:33:24.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.784785 kernel: audit: type=1130 audit(1757378004.780:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.835790 kernel: Loading iSCSI transport class v2.0-870. Sep 9 00:33:24.847780 kernel: iscsi: registered transport (tcp) Sep 9 00:33:24.863789 kernel: iscsi: registered transport (qla4xxx) Sep 9 00:33:24.863815 kernel: QLogic iSCSI HBA Driver Sep 9 00:33:24.898265 systemd[1]: Finished dracut-cmdline.service. Sep 9 00:33:24.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.899712 systemd[1]: Starting dracut-pre-udev.service... Sep 9 00:33:24.904316 kernel: audit: type=1130 audit(1757378004.898:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:24.944807 kernel: raid6: neonx8 gen() 13686 MB/s Sep 9 00:33:24.961804 kernel: raid6: neonx8 xor() 6602 MB/s Sep 9 00:33:24.978786 kernel: raid6: neonx4 gen() 10552 MB/s Sep 9 00:33:24.995794 kernel: raid6: neonx4 xor() 10130 MB/s Sep 9 00:33:25.012794 kernel: raid6: neonx2 gen() 8099 MB/s Sep 9 00:33:25.029803 kernel: raid6: neonx2 xor() 8813 MB/s Sep 9 00:33:25.046813 kernel: raid6: neonx1 gen() 9621 MB/s Sep 9 00:33:25.063808 kernel: raid6: neonx1 xor() 8324 MB/s Sep 9 00:33:25.080804 kernel: raid6: int64x8 gen() 6202 MB/s Sep 9 00:33:25.097827 kernel: raid6: int64x8 xor() 3436 MB/s Sep 9 00:33:25.114850 kernel: raid6: int64x4 gen() 6669 MB/s Sep 9 00:33:25.131866 kernel: raid6: int64x4 xor() 3833 MB/s Sep 9 00:33:25.148810 kernel: raid6: int64x2 gen() 6098 MB/s Sep 9 00:33:25.165820 kernel: raid6: int64x2 xor() 3317 MB/s Sep 9 00:33:25.182808 kernel: raid6: int64x1 gen() 5040 MB/s Sep 9 00:33:25.200096 kernel: raid6: int64x1 xor() 2641 MB/s Sep 9 00:33:25.200150 kernel: raid6: using algorithm neonx8 gen() 13686 MB/s Sep 9 00:33:25.200160 kernel: raid6: .... xor() 6602 MB/s, rmw enabled Sep 9 00:33:25.200178 kernel: raid6: using neon recovery algorithm Sep 9 00:33:25.211804 kernel: xor: measuring software checksum speed Sep 9 00:33:25.211862 kernel: 8regs : 16177 MB/sec Sep 9 00:33:25.212800 kernel: 32regs : 20717 MB/sec Sep 9 00:33:25.212839 kernel: arm64_neon : 25989 MB/sec Sep 9 00:33:25.213795 kernel: xor: using function: arm64_neon (25989 MB/sec) Sep 9 00:33:25.266815 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 9 00:33:25.277192 systemd[1]: Finished dracut-pre-udev.service. Sep 9 00:33:25.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:25.277000 audit: BPF prog-id=7 op=LOAD Sep 9 00:33:25.277000 audit: BPF prog-id=8 op=LOAD Sep 9 00:33:25.278872 systemd[1]: Starting systemd-udevd.service... Sep 9 00:33:25.295711 systemd-udevd[493]: Using default interface naming scheme 'v252'. Sep 9 00:33:25.302059 systemd[1]: Started systemd-udevd.service. Sep 9 00:33:25.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:25.307039 systemd[1]: Starting dracut-pre-trigger.service... Sep 9 00:33:25.322946 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Sep 9 00:33:25.359375 systemd[1]: Finished dracut-pre-trigger.service. Sep 9 00:33:25.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:25.360921 systemd[1]: Starting systemd-udev-trigger.service... Sep 9 00:33:25.395694 systemd[1]: Finished systemd-udev-trigger.service. Sep 9 00:33:25.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:25.443729 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Sep 9 00:33:25.452442 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 9 00:33:25.452463 kernel: GPT:9289727 != 19775487 Sep 9 00:33:25.452472 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 9 00:33:25.452480 kernel: GPT:9289727 != 19775487 Sep 9 00:33:25.452488 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 9 00:33:25.452496 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:33:25.470300 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 9 00:33:25.475797 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (538) Sep 9 00:33:25.477864 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 9 00:33:25.482511 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 9 00:33:25.483344 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 9 00:33:25.489074 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 9 00:33:25.490574 systemd[1]: Starting disk-uuid.service... Sep 9 00:33:25.498200 disk-uuid[560]: Primary Header is updated. Sep 9 00:33:25.498200 disk-uuid[560]: Secondary Entries is updated. Sep 9 00:33:25.498200 disk-uuid[560]: Secondary Header is updated. Sep 9 00:33:25.500812 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:33:26.512791 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 9 00:33:26.512850 disk-uuid[561]: The operation has completed successfully. Sep 9 00:33:26.554295 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 9 00:33:26.554386 systemd[1]: Finished disk-uuid.service. Sep 9 00:33:26.555952 systemd[1]: Starting verity-setup.service... Sep 9 00:33:26.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.569785 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 9 00:33:26.612418 systemd[1]: Found device dev-mapper-usr.device. Sep 9 00:33:26.614648 systemd[1]: Finished verity-setup.service. Sep 9 00:33:26.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.616247 systemd[1]: Mounting sysusr-usr.mount... Sep 9 00:33:26.671930 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 9 00:33:26.672231 systemd[1]: Mounted sysusr-usr.mount. Sep 9 00:33:26.672912 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 9 00:33:26.673603 systemd[1]: Starting ignition-setup.service... Sep 9 00:33:26.676483 systemd[1]: Starting parse-ip-for-networkd.service... Sep 9 00:33:26.682380 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Sep 9 00:33:26.682412 kernel: BTRFS info (device vda6): using free space tree Sep 9 00:33:26.682422 kernel: BTRFS info (device vda6): has skinny extents Sep 9 00:33:26.691064 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 9 00:33:26.696519 systemd[1]: Finished ignition-setup.service. Sep 9 00:33:26.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.697929 systemd[1]: Starting ignition-fetch-offline.service... Sep 9 00:33:26.745199 ignition[642]: Ignition 2.14.0 Sep 9 00:33:26.745209 ignition[642]: Stage: fetch-offline Sep 9 00:33:26.745247 ignition[642]: no configs at "/usr/lib/ignition/base.d" Sep 9 00:33:26.745256 ignition[642]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:33:26.745391 ignition[642]: parsed url from cmdline: "" Sep 9 00:33:26.745395 ignition[642]: no config URL provided Sep 9 00:33:26.745400 ignition[642]: reading system config file "/usr/lib/ignition/user.ign" Sep 9 00:33:26.745407 ignition[642]: no config at "/usr/lib/ignition/user.ign" Sep 9 00:33:26.745425 ignition[642]: op(1): [started] loading QEMU firmware config module Sep 9 00:33:26.745429 ignition[642]: op(1): executing: "modprobe" "qemu_fw_cfg" Sep 9 00:33:26.749551 ignition[642]: op(1): [finished] loading QEMU firmware config module Sep 9 00:33:26.749571 ignition[642]: QEMU firmware config was not found. Ignoring... Sep 9 00:33:26.758918 ignition[642]: parsing config with SHA512: 9f469f6a26460e921fc86b163871d2942e98992aec8c91a45a807580c713bb20b59f3fd8dda65f43cdaa6a292d3b480547d923207543877114b06328fd6aaf32 Sep 9 00:33:26.765903 unknown[642]: fetched base config from "system" Sep 9 00:33:26.766217 ignition[642]: fetch-offline: fetch-offline passed Sep 9 00:33:26.765914 unknown[642]: fetched user config from "qemu" Sep 9 00:33:26.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.766274 ignition[642]: Ignition finished successfully Sep 9 00:33:26.767979 systemd[1]: Finished ignition-fetch-offline.service. Sep 9 00:33:26.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.770000 audit: BPF prog-id=9 op=LOAD Sep 9 00:33:26.770245 systemd[1]: Finished parse-ip-for-networkd.service. Sep 9 00:33:26.772239 systemd[1]: Starting systemd-networkd.service... Sep 9 00:33:26.792666 systemd-networkd[738]: lo: Link UP Sep 9 00:33:26.792679 systemd-networkd[738]: lo: Gained carrier Sep 9 00:33:26.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.793105 systemd-networkd[738]: Enumeration completed Sep 9 00:33:26.793207 systemd[1]: Started systemd-networkd.service. Sep 9 00:33:26.793289 systemd-networkd[738]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 9 00:33:26.794144 systemd[1]: Reached target network.target. Sep 9 00:33:26.794832 systemd-networkd[738]: eth0: Link UP Sep 9 00:33:26.794836 systemd-networkd[738]: eth0: Gained carrier Sep 9 00:33:26.795403 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Sep 9 00:33:26.796284 systemd[1]: Starting ignition-kargs.service... Sep 9 00:33:26.798361 systemd[1]: Starting iscsiuio.service... Sep 9 00:33:26.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.805899 systemd[1]: Started iscsiuio.service. Sep 9 00:33:26.807451 systemd[1]: Starting iscsid.service... Sep 9 00:33:26.810940 iscsid[744]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 9 00:33:26.810940 iscsid[744]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 9 00:33:26.810940 iscsid[744]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 9 00:33:26.810940 iscsid[744]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 9 00:33:26.810940 iscsid[744]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 9 00:33:26.810940 iscsid[744]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 9 00:33:26.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.813326 ignition[740]: Ignition 2.14.0 Sep 9 00:33:26.813799 systemd[1]: Started iscsid.service. Sep 9 00:33:26.813333 ignition[740]: Stage: kargs Sep 9 00:33:26.814888 systemd-networkd[738]: eth0: DHCPv4 address 10.0.0.76/16, gateway 10.0.0.1 acquired from 10.0.0.1 Sep 9 00:33:26.813425 ignition[740]: no configs at "/usr/lib/ignition/base.d" Sep 9 00:33:26.817322 systemd[1]: Finished ignition-kargs.service. Sep 9 00:33:26.813434 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:33:26.818804 systemd[1]: Starting dracut-initqueue.service... Sep 9 00:33:26.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.814117 ignition[740]: kargs: kargs passed Sep 9 00:33:26.820175 systemd[1]: Starting ignition-disks.service... Sep 9 00:33:26.814158 ignition[740]: Ignition finished successfully Sep 9 00:33:26.827715 systemd[1]: Finished ignition-disks.service. Sep 9 00:33:26.826211 ignition[751]: Ignition 2.14.0 Sep 9 00:33:26.828678 systemd[1]: Reached target initrd-root-device.target. Sep 9 00:33:26.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.826217 ignition[751]: Stage: disks Sep 9 00:33:26.829680 systemd[1]: Reached target local-fs-pre.target. Sep 9 00:33:26.826305 ignition[751]: no configs at "/usr/lib/ignition/base.d" Sep 9 00:33:26.830644 systemd[1]: Reached target local-fs.target. Sep 9 00:33:26.826313 ignition[751]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:33:26.831681 systemd[1]: Reached target sysinit.target. Sep 9 00:33:26.826959 ignition[751]: disks: disks passed Sep 9 00:33:26.832730 systemd[1]: Reached target basic.target. Sep 9 00:33:26.827000 ignition[751]: Ignition finished successfully Sep 9 00:33:26.834055 systemd[1]: Finished dracut-initqueue.service. Sep 9 00:33:26.834878 systemd[1]: Reached target remote-fs-pre.target. Sep 9 00:33:26.835941 systemd[1]: Reached target remote-cryptsetup.target. Sep 9 00:33:26.836957 systemd[1]: Reached target remote-fs.target. Sep 9 00:33:26.838831 systemd[1]: Starting dracut-pre-mount.service... Sep 9 00:33:26.847068 systemd[1]: Finished dracut-pre-mount.service. Sep 9 00:33:26.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.848624 systemd[1]: Starting systemd-fsck-root.service... Sep 9 00:33:26.859982 systemd-fsck[771]: ROOT: clean, 629/553520 files, 56027/553472 blocks Sep 9 00:33:26.863504 systemd[1]: Finished systemd-fsck-root.service. Sep 9 00:33:26.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.864988 systemd[1]: Mounting sysroot.mount... Sep 9 00:33:26.869788 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 9 00:33:26.870253 systemd[1]: Mounted sysroot.mount. Sep 9 00:33:26.870859 systemd[1]: Reached target initrd-root-fs.target. Sep 9 00:33:26.873212 systemd[1]: Mounting sysroot-usr.mount... Sep 9 00:33:26.873958 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 9 00:33:26.873998 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 9 00:33:26.874019 systemd[1]: Reached target ignition-diskful.target. Sep 9 00:33:26.875888 systemd[1]: Mounted sysroot-usr.mount. Sep 9 00:33:26.878354 systemd[1]: Starting initrd-setup-root.service... Sep 9 00:33:26.883970 initrd-setup-root[781]: cut: /sysroot/etc/passwd: No such file or directory Sep 9 00:33:26.887852 initrd-setup-root[789]: cut: /sysroot/etc/group: No such file or directory Sep 9 00:33:26.891795 initrd-setup-root[797]: cut: /sysroot/etc/shadow: No such file or directory Sep 9 00:33:26.896471 initrd-setup-root[805]: cut: /sysroot/etc/gshadow: No such file or directory Sep 9 00:33:26.927994 systemd[1]: Finished initrd-setup-root.service. Sep 9 00:33:26.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.929585 systemd[1]: Starting ignition-mount.service... Sep 9 00:33:26.931002 systemd[1]: Starting sysroot-boot.service... Sep 9 00:33:26.935405 bash[822]: umount: /sysroot/usr/share/oem: not mounted. Sep 9 00:33:26.944866 ignition[824]: INFO : Ignition 2.14.0 Sep 9 00:33:26.945597 ignition[824]: INFO : Stage: mount Sep 9 00:33:26.946317 ignition[824]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 9 00:33:26.947201 ignition[824]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:33:26.948665 ignition[824]: INFO : mount: mount passed Sep 9 00:33:26.949327 ignition[824]: INFO : Ignition finished successfully Sep 9 00:33:26.950504 systemd[1]: Finished ignition-mount.service. Sep 9 00:33:26.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:26.952626 systemd[1]: Finished sysroot-boot.service. Sep 9 00:33:26.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:27.627238 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 9 00:33:27.633799 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (833) Sep 9 00:33:27.633846 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Sep 9 00:33:27.635160 kernel: BTRFS info (device vda6): using free space tree Sep 9 00:33:27.635179 kernel: BTRFS info (device vda6): has skinny extents Sep 9 00:33:27.638339 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 9 00:33:27.639686 systemd[1]: Starting ignition-files.service... Sep 9 00:33:27.653481 ignition[853]: INFO : Ignition 2.14.0 Sep 9 00:33:27.653481 ignition[853]: INFO : Stage: files Sep 9 00:33:27.654844 ignition[853]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 9 00:33:27.654844 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:33:27.654844 ignition[853]: DEBUG : files: compiled without relabeling support, skipping Sep 9 00:33:27.658013 ignition[853]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 9 00:33:27.658013 ignition[853]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 9 00:33:27.660829 ignition[853]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 9 00:33:27.660829 ignition[853]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 9 00:33:27.662816 ignition[853]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 9 00:33:27.662816 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 9 00:33:27.662816 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 9 00:33:27.662816 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 9 00:33:27.661584 unknown[853]: wrote ssh authorized keys file for user: core Sep 9 00:33:27.668766 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 9 00:33:27.668766 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 9 00:33:27.668766 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 9 00:33:27.668766 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 9 00:33:27.668766 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 Sep 9 00:33:28.156956 systemd-networkd[738]: eth0: Gained IPv6LL Sep 9 00:33:28.329628 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Sep 9 00:33:28.870283 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Sep 9 00:33:28.870283 ignition[853]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Sep 9 00:33:28.873712 ignition[853]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 9 00:33:28.873712 ignition[853]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 9 00:33:28.873712 ignition[853]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Sep 9 00:33:28.873712 ignition[853]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Sep 9 00:33:28.873712 ignition[853]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Sep 9 00:33:28.906385 ignition[853]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Sep 9 00:33:28.907823 ignition[853]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Sep 9 00:33:28.907823 ignition[853]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 9 00:33:28.907823 ignition[853]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 9 00:33:28.907823 ignition[853]: INFO : files: files passed Sep 9 00:33:28.907823 ignition[853]: INFO : Ignition finished successfully Sep 9 00:33:28.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.907834 systemd[1]: Finished ignition-files.service. Sep 9 00:33:28.910397 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 9 00:33:28.911485 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 9 00:33:28.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.918610 initrd-setup-root-after-ignition[879]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Sep 9 00:33:28.912142 systemd[1]: Starting ignition-quench.service... Sep 9 00:33:28.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.921442 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 9 00:33:28.915836 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 9 00:33:28.915924 systemd[1]: Finished ignition-quench.service. Sep 9 00:33:28.920054 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 9 00:33:28.920888 systemd[1]: Reached target ignition-complete.target. Sep 9 00:33:28.923313 systemd[1]: Starting initrd-parse-etc.service... Sep 9 00:33:28.935678 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 9 00:33:28.936537 systemd[1]: Finished initrd-parse-etc.service. Sep 9 00:33:28.937308 systemd[1]: Reached target initrd-fs.target. Sep 9 00:33:28.937907 systemd[1]: Reached target initrd.target. Sep 9 00:33:28.938924 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 9 00:33:28.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.939642 systemd[1]: Starting dracut-pre-pivot.service... Sep 9 00:33:28.949862 systemd[1]: Finished dracut-pre-pivot.service. Sep 9 00:33:28.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.951272 systemd[1]: Starting initrd-cleanup.service... Sep 9 00:33:28.959239 systemd[1]: Stopped target nss-lookup.target. Sep 9 00:33:28.960008 systemd[1]: Stopped target remote-cryptsetup.target. Sep 9 00:33:28.961180 systemd[1]: Stopped target timers.target. Sep 9 00:33:28.962340 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 9 00:33:28.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.962444 systemd[1]: Stopped dracut-pre-pivot.service. Sep 9 00:33:28.963484 systemd[1]: Stopped target initrd.target. Sep 9 00:33:28.964491 systemd[1]: Stopped target basic.target. Sep 9 00:33:28.965446 systemd[1]: Stopped target ignition-complete.target. Sep 9 00:33:28.966440 systemd[1]: Stopped target ignition-diskful.target. Sep 9 00:33:28.967521 systemd[1]: Stopped target initrd-root-device.target. Sep 9 00:33:28.968735 systemd[1]: Stopped target remote-fs.target. Sep 9 00:33:28.969858 systemd[1]: Stopped target remote-fs-pre.target. Sep 9 00:33:28.971200 systemd[1]: Stopped target sysinit.target. Sep 9 00:33:28.972195 systemd[1]: Stopped target local-fs.target. Sep 9 00:33:28.973322 systemd[1]: Stopped target local-fs-pre.target. Sep 9 00:33:28.974443 systemd[1]: Stopped target swap.target. Sep 9 00:33:28.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.975550 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 9 00:33:28.975664 systemd[1]: Stopped dracut-pre-mount.service. Sep 9 00:33:28.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.976837 systemd[1]: Stopped target cryptsetup.target. Sep 9 00:33:28.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.977759 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 9 00:33:28.977906 systemd[1]: Stopped dracut-initqueue.service. Sep 9 00:33:28.979139 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 9 00:33:28.979232 systemd[1]: Stopped ignition-fetch-offline.service. Sep 9 00:33:28.980262 systemd[1]: Stopped target paths.target. Sep 9 00:33:28.981220 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 9 00:33:28.985810 systemd[1]: Stopped systemd-ask-password-console.path. Sep 9 00:33:28.986680 systemd[1]: Stopped target slices.target. Sep 9 00:33:28.987922 systemd[1]: Stopped target sockets.target. Sep 9 00:33:28.988904 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 9 00:33:28.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.989019 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 9 00:33:28.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.990388 systemd[1]: ignition-files.service: Deactivated successfully. Sep 9 00:33:28.995880 iscsid[744]: iscsid shutting down. Sep 9 00:33:28.990482 systemd[1]: Stopped ignition-files.service. Sep 9 00:33:28.992645 systemd[1]: Stopping ignition-mount.service... Sep 9 00:33:28.993419 systemd[1]: Stopping iscsid.service... Sep 9 00:33:29.005919 kernel: kauditd_printk_skb: 37 callbacks suppressed Sep 9 00:33:29.005942 kernel: audit: type=1131 audit(1757378008.997:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.005954 kernel: audit: type=1131 audit(1757378009.003:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.997489 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 9 00:33:29.009662 kernel: audit: type=1131 audit(1757378009.005:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.009714 ignition[894]: INFO : Ignition 2.14.0 Sep 9 00:33:29.009714 ignition[894]: INFO : Stage: umount Sep 9 00:33:29.009714 ignition[894]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 9 00:33:29.009714 ignition[894]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 9 00:33:29.009714 ignition[894]: INFO : umount: umount passed Sep 9 00:33:29.009714 ignition[894]: INFO : Ignition finished successfully Sep 9 00:33:29.028951 kernel: audit: type=1131 audit(1757378009.011:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.028984 kernel: audit: type=1131 audit(1757378009.015:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.028996 kernel: audit: type=1130 audit(1757378009.019:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.029005 kernel: audit: type=1131 audit(1757378009.019:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.029015 kernel: audit: type=1131 audit(1757378009.024:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.029024 kernel: audit: type=1131 audit(1757378009.028:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.997628 systemd[1]: Stopped kmod-static-nodes.service. Sep 9 00:33:29.037503 kernel: audit: type=1131 audit(1757378009.031:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:28.999495 systemd[1]: Stopping sysroot-boot.service... Sep 9 00:33:29.002152 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 9 00:33:29.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.002588 systemd[1]: Stopped systemd-udev-trigger.service. Sep 9 00:33:29.003820 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 9 00:33:29.003965 systemd[1]: Stopped dracut-pre-trigger.service. Sep 9 00:33:29.010049 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 9 00:33:29.010719 systemd[1]: iscsid.service: Deactivated successfully. Sep 9 00:33:29.010836 systemd[1]: Stopped iscsid.service. Sep 9 00:33:29.012178 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 9 00:33:29.012256 systemd[1]: Stopped ignition-mount.service. Sep 9 00:33:29.017115 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 9 00:33:29.017190 systemd[1]: Finished initrd-cleanup.service. Sep 9 00:33:29.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.019439 systemd[1]: iscsid.socket: Deactivated successfully. Sep 9 00:33:29.019475 systemd[1]: Closed iscsid.socket. Sep 9 00:33:29.024761 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 9 00:33:29.024826 systemd[1]: Stopped ignition-disks.service. Sep 9 00:33:29.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.025432 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 9 00:33:29.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.025465 systemd[1]: Stopped ignition-kargs.service. Sep 9 00:33:29.028351 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 9 00:33:29.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.028388 systemd[1]: Stopped ignition-setup.service. Sep 9 00:33:29.032003 systemd[1]: Stopping iscsiuio.service... Sep 9 00:33:29.038091 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 9 00:33:29.038184 systemd[1]: Stopped iscsiuio.service. Sep 9 00:33:29.039090 systemd[1]: Stopped target network.target. Sep 9 00:33:29.040256 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 9 00:33:29.040285 systemd[1]: Closed iscsiuio.socket. Sep 9 00:33:29.042458 systemd[1]: Stopping systemd-networkd.service... Sep 9 00:33:29.044056 systemd[1]: Stopping systemd-resolved.service... Sep 9 00:33:29.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.048911 systemd-networkd[738]: eth0: DHCPv6 lease lost Sep 9 00:33:29.068000 audit: BPF prog-id=9 op=UNLOAD Sep 9 00:33:29.050138 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 9 00:33:29.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.050230 systemd[1]: Stopped systemd-networkd.service. Sep 9 00:33:29.051550 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 9 00:33:29.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.051580 systemd[1]: Closed systemd-networkd.socket. Sep 9 00:33:29.071000 audit: BPF prog-id=6 op=UNLOAD Sep 9 00:33:29.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.053570 systemd[1]: Stopping network-cleanup.service... Sep 9 00:33:29.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.054485 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 9 00:33:29.054534 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 9 00:33:29.056027 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 9 00:33:29.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.056066 systemd[1]: Stopped systemd-sysctl.service. Sep 9 00:33:29.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.057786 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 9 00:33:29.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.057837 systemd[1]: Stopped systemd-modules-load.service. Sep 9 00:33:29.059256 systemd[1]: Stopping systemd-udevd.service... Sep 9 00:33:29.065577 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 9 00:33:29.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.066101 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 9 00:33:29.066198 systemd[1]: Stopped systemd-resolved.service. Sep 9 00:33:29.067577 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 9 00:33:29.067660 systemd[1]: Stopped sysroot-boot.service. Sep 9 00:33:29.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:29.069823 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 9 00:33:29.069878 systemd[1]: Stopped initrd-setup-root.service. Sep 9 00:33:29.071219 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 9 00:33:29.071339 systemd[1]: Stopped systemd-udevd.service. Sep 9 00:33:29.072841 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 9 00:33:29.072918 systemd[1]: Stopped network-cleanup.service. Sep 9 00:33:29.073928 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 9 00:33:29.073963 systemd[1]: Closed systemd-udevd-control.socket. Sep 9 00:33:29.074949 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 9 00:33:29.074978 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 9 00:33:29.076512 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 9 00:33:29.076558 systemd[1]: Stopped dracut-pre-udev.service. Sep 9 00:33:29.077784 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 9 00:33:29.077832 systemd[1]: Stopped dracut-cmdline.service. Sep 9 00:33:29.079175 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 9 00:33:29.079218 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 9 00:33:29.081185 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 9 00:33:29.083175 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 9 00:33:29.083243 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 9 00:33:29.086783 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 9 00:33:29.086880 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 9 00:33:29.088296 systemd[1]: Reached target initrd-switch-root.target. Sep 9 00:33:29.090293 systemd[1]: Starting initrd-switch-root.service... Sep 9 00:33:29.097212 systemd[1]: Switching root. Sep 9 00:33:29.114132 systemd-journald[291]: Journal stopped Sep 9 00:33:31.181861 systemd-journald[291]: Received SIGTERM from PID 1 (systemd). Sep 9 00:33:31.181920 kernel: SELinux: Class mctp_socket not defined in policy. Sep 9 00:33:31.181933 kernel: SELinux: Class anon_inode not defined in policy. Sep 9 00:33:31.181943 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 9 00:33:31.181953 kernel: SELinux: policy capability network_peer_controls=1 Sep 9 00:33:31.181963 kernel: SELinux: policy capability open_perms=1 Sep 9 00:33:31.181972 kernel: SELinux: policy capability extended_socket_class=1 Sep 9 00:33:31.181982 kernel: SELinux: policy capability always_check_network=0 Sep 9 00:33:31.181994 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 9 00:33:31.182004 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 9 00:33:31.182014 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 9 00:33:31.182023 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 9 00:33:31.182033 systemd[1]: Successfully loaded SELinux policy in 33.771ms. Sep 9 00:33:31.182053 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.695ms. Sep 9 00:33:31.182065 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 9 00:33:31.182075 systemd[1]: Detected virtualization kvm. Sep 9 00:33:31.182085 systemd[1]: Detected architecture arm64. Sep 9 00:33:31.182097 systemd[1]: Detected first boot. Sep 9 00:33:31.182108 systemd[1]: Initializing machine ID from VM UUID. Sep 9 00:33:31.182120 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 9 00:33:31.182130 systemd[1]: Populated /etc with preset unit settings. Sep 9 00:33:31.182141 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 9 00:33:31.182153 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 9 00:33:31.182164 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 9 00:33:31.182177 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 9 00:33:31.182190 systemd[1]: Stopped initrd-switch-root.service. Sep 9 00:33:31.182201 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 9 00:33:31.182211 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 9 00:33:31.182221 systemd[1]: Created slice system-addon\x2drun.slice. Sep 9 00:33:31.182231 systemd[1]: Created slice system-getty.slice. Sep 9 00:33:31.182242 systemd[1]: Created slice system-modprobe.slice. Sep 9 00:33:31.182253 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 9 00:33:31.182264 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 9 00:33:31.182275 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 9 00:33:31.182285 systemd[1]: Created slice user.slice. Sep 9 00:33:31.182295 systemd[1]: Started systemd-ask-password-console.path. Sep 9 00:33:31.182305 systemd[1]: Started systemd-ask-password-wall.path. Sep 9 00:33:31.182315 systemd[1]: Set up automount boot.automount. Sep 9 00:33:31.182329 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 9 00:33:31.182339 systemd[1]: Stopped target initrd-switch-root.target. Sep 9 00:33:31.182352 systemd[1]: Stopped target initrd-fs.target. Sep 9 00:33:31.182363 systemd[1]: Stopped target initrd-root-fs.target. Sep 9 00:33:31.182374 systemd[1]: Reached target integritysetup.target. Sep 9 00:33:31.182384 systemd[1]: Reached target remote-cryptsetup.target. Sep 9 00:33:31.182396 systemd[1]: Reached target remote-fs.target. Sep 9 00:33:31.182406 systemd[1]: Reached target slices.target. Sep 9 00:33:31.182416 systemd[1]: Reached target swap.target. Sep 9 00:33:31.182427 systemd[1]: Reached target torcx.target. Sep 9 00:33:31.182437 systemd[1]: Reached target veritysetup.target. Sep 9 00:33:31.182447 systemd[1]: Listening on systemd-coredump.socket. Sep 9 00:33:31.182458 systemd[1]: Listening on systemd-initctl.socket. Sep 9 00:33:31.182468 systemd[1]: Listening on systemd-networkd.socket. Sep 9 00:33:31.182478 systemd[1]: Listening on systemd-udevd-control.socket. Sep 9 00:33:31.182488 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 9 00:33:31.182499 systemd[1]: Listening on systemd-userdbd.socket. Sep 9 00:33:31.182510 systemd[1]: Mounting dev-hugepages.mount... Sep 9 00:33:31.182521 systemd[1]: Mounting dev-mqueue.mount... Sep 9 00:33:31.182531 systemd[1]: Mounting media.mount... Sep 9 00:33:31.182541 systemd[1]: Mounting sys-kernel-debug.mount... Sep 9 00:33:31.182552 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 9 00:33:31.182562 systemd[1]: Mounting tmp.mount... Sep 9 00:33:31.182573 systemd[1]: Starting flatcar-tmpfiles.service... Sep 9 00:33:31.182584 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:33:31.182596 systemd[1]: Starting kmod-static-nodes.service... Sep 9 00:33:31.182606 systemd[1]: Starting modprobe@configfs.service... Sep 9 00:33:31.182616 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:33:31.182626 systemd[1]: Starting modprobe@drm.service... Sep 9 00:33:31.182636 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:33:31.182646 systemd[1]: Starting modprobe@fuse.service... Sep 9 00:33:31.182657 systemd[1]: Starting modprobe@loop.service... Sep 9 00:33:31.182667 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 9 00:33:31.182678 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 9 00:33:31.182689 systemd[1]: Stopped systemd-fsck-root.service. Sep 9 00:33:31.182700 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 9 00:33:31.182710 systemd[1]: Stopped systemd-fsck-usr.service. Sep 9 00:33:31.182720 systemd[1]: Stopped systemd-journald.service. Sep 9 00:33:31.182730 systemd[1]: Starting systemd-journald.service... Sep 9 00:33:31.182740 kernel: loop: module loaded Sep 9 00:33:31.182751 systemd[1]: Starting systemd-modules-load.service... Sep 9 00:33:31.182763 kernel: fuse: init (API version 7.34) Sep 9 00:33:31.182810 systemd[1]: Starting systemd-network-generator.service... Sep 9 00:33:31.182821 systemd[1]: Starting systemd-remount-fs.service... Sep 9 00:33:31.182832 systemd[1]: Starting systemd-udev-trigger.service... Sep 9 00:33:31.182842 systemd[1]: verity-setup.service: Deactivated successfully. Sep 9 00:33:31.182855 systemd[1]: Stopped verity-setup.service. Sep 9 00:33:31.182866 systemd[1]: Mounted dev-hugepages.mount. Sep 9 00:33:31.182876 systemd[1]: Mounted dev-mqueue.mount. Sep 9 00:33:31.182886 systemd[1]: Mounted media.mount. Sep 9 00:33:31.182897 systemd[1]: Mounted sys-kernel-debug.mount. Sep 9 00:33:31.182907 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 9 00:33:31.182920 systemd-journald[994]: Journal started Sep 9 00:33:31.183030 systemd-journald[994]: Runtime Journal (/run/log/journal/c868ce1281cd4df98e9ec590bb01f618) is 6.0M, max 48.7M, 42.6M free. Sep 9 00:33:29.172000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 9 00:33:29.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 9 00:33:29.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 9 00:33:29.249000 audit: BPF prog-id=10 op=LOAD Sep 9 00:33:29.249000 audit: BPF prog-id=10 op=UNLOAD Sep 9 00:33:29.249000 audit: BPF prog-id=11 op=LOAD Sep 9 00:33:29.249000 audit: BPF prog-id=11 op=UNLOAD Sep 9 00:33:29.294000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 9 00:33:29.294000 audit[928]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:29.294000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 9 00:33:29.295000 audit[928]: AVC avc: denied { associate } for pid=928 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 9 00:33:29.295000 audit[928]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=911 pid=928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:29.295000 audit: CWD cwd="/" Sep 9 00:33:29.295000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:29.295000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:29.295000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 9 00:33:31.071000 audit: BPF prog-id=12 op=LOAD Sep 9 00:33:31.071000 audit: BPF prog-id=3 op=UNLOAD Sep 9 00:33:31.071000 audit: BPF prog-id=13 op=LOAD Sep 9 00:33:31.071000 audit: BPF prog-id=14 op=LOAD Sep 9 00:33:31.071000 audit: BPF prog-id=4 op=UNLOAD Sep 9 00:33:31.071000 audit: BPF prog-id=5 op=UNLOAD Sep 9 00:33:31.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.079000 audit: BPF prog-id=12 op=UNLOAD Sep 9 00:33:31.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.160000 audit: BPF prog-id=15 op=LOAD Sep 9 00:33:31.160000 audit: BPF prog-id=16 op=LOAD Sep 9 00:33:31.160000 audit: BPF prog-id=17 op=LOAD Sep 9 00:33:31.160000 audit: BPF prog-id=13 op=UNLOAD Sep 9 00:33:31.160000 audit: BPF prog-id=14 op=UNLOAD Sep 9 00:33:31.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.180000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 9 00:33:31.180000 audit[994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffdd19d10 a2=4000 a3=1 items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:31.180000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 9 00:33:31.070469 systemd[1]: Queued start job for default target multi-user.target. Sep 9 00:33:29.292856 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 9 00:33:31.070483 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 9 00:33:29.293155 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 9 00:33:31.073265 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 9 00:33:29.293175 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 9 00:33:29.293209 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 9 00:33:29.293219 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 9 00:33:29.293249 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 9 00:33:29.293261 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 9 00:33:29.293453 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 9 00:33:31.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.184786 systemd[1]: Started systemd-journald.service. Sep 9 00:33:29.293486 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 9 00:33:29.293498 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 9 00:33:29.294374 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 9 00:33:29.294411 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 9 00:33:31.184975 systemd[1]: Mounted tmp.mount. Sep 9 00:33:29.294430 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 9 00:33:29.294445 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 9 00:33:29.294463 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 9 00:33:29.294476 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 9 00:33:30.804549 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:30Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:33:30.804839 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:30Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:33:30.805012 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:30Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:33:30.805181 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:30Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 9 00:33:30.805233 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:30Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 9 00:33:30.805289 /usr/lib/systemd/system-generators/torcx-generator[928]: time="2025-09-09T00:33:30Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 9 00:33:31.185970 systemd[1]: Finished kmod-static-nodes.service. Sep 9 00:33:31.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.186895 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 9 00:33:31.187027 systemd[1]: Finished modprobe@configfs.service. Sep 9 00:33:31.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.187988 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:33:31.188148 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:33:31.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.189014 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 9 00:33:31.189176 systemd[1]: Finished modprobe@drm.service. Sep 9 00:33:31.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.190062 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:33:31.190517 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:33:31.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.191704 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 9 00:33:31.192031 systemd[1]: Finished modprobe@fuse.service. Sep 9 00:33:31.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.192889 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:33:31.193053 systemd[1]: Finished modprobe@loop.service. Sep 9 00:33:31.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.193978 systemd[1]: Finished systemd-modules-load.service. Sep 9 00:33:31.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.195017 systemd[1]: Finished systemd-network-generator.service. Sep 9 00:33:31.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.196021 systemd[1]: Finished systemd-remount-fs.service. Sep 9 00:33:31.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.197159 systemd[1]: Reached target network-pre.target. Sep 9 00:33:31.199296 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 9 00:33:31.201042 systemd[1]: Mounting sys-kernel-config.mount... Sep 9 00:33:31.201647 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 9 00:33:31.204752 systemd[1]: Starting systemd-hwdb-update.service... Sep 9 00:33:31.206396 systemd[1]: Starting systemd-journal-flush.service... Sep 9 00:33:31.207169 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 9 00:33:31.208232 systemd[1]: Starting systemd-random-seed.service... Sep 9 00:33:31.208918 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 9 00:33:31.209913 systemd[1]: Starting systemd-sysctl.service... Sep 9 00:33:31.211684 systemd-journald[994]: Time spent on flushing to /var/log/journal/c868ce1281cd4df98e9ec590bb01f618 is 22.286ms for 969 entries. Sep 9 00:33:31.211684 systemd-journald[994]: System Journal (/var/log/journal/c868ce1281cd4df98e9ec590bb01f618) is 8.0M, max 195.6M, 187.6M free. Sep 9 00:33:31.249840 systemd-journald[994]: Received client request to flush runtime journal. Sep 9 00:33:31.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.213970 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 9 00:33:31.214786 systemd[1]: Mounted sys-kernel-config.mount. Sep 9 00:33:31.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.251637 udevadm[1028]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 9 00:33:31.218487 systemd[1]: Finished flatcar-tmpfiles.service. Sep 9 00:33:31.220518 systemd[1]: Starting systemd-sysusers.service... Sep 9 00:33:31.223115 systemd[1]: Finished systemd-udev-trigger.service. Sep 9 00:33:31.224855 systemd[1]: Starting systemd-udev-settle.service... Sep 9 00:33:31.225995 systemd[1]: Finished systemd-random-seed.service. Sep 9 00:33:31.226840 systemd[1]: Reached target first-boot-complete.target. Sep 9 00:33:31.235256 systemd[1]: Finished systemd-sysctl.service. Sep 9 00:33:31.241216 systemd[1]: Finished systemd-sysusers.service. Sep 9 00:33:31.250711 systemd[1]: Finished systemd-journal-flush.service. Sep 9 00:33:31.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.591147 systemd[1]: Finished systemd-hwdb-update.service. Sep 9 00:33:31.591000 audit: BPF prog-id=18 op=LOAD Sep 9 00:33:31.591000 audit: BPF prog-id=19 op=LOAD Sep 9 00:33:31.591000 audit: BPF prog-id=7 op=UNLOAD Sep 9 00:33:31.591000 audit: BPF prog-id=8 op=UNLOAD Sep 9 00:33:31.593124 systemd[1]: Starting systemd-udevd.service... Sep 9 00:33:31.608459 systemd-udevd[1031]: Using default interface naming scheme 'v252'. Sep 9 00:33:31.622366 systemd[1]: Started systemd-udevd.service. Sep 9 00:33:31.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.623000 audit: BPF prog-id=20 op=LOAD Sep 9 00:33:31.624607 systemd[1]: Starting systemd-networkd.service... Sep 9 00:33:31.641000 audit: BPF prog-id=21 op=LOAD Sep 9 00:33:31.641000 audit: BPF prog-id=22 op=LOAD Sep 9 00:33:31.641000 audit: BPF prog-id=23 op=LOAD Sep 9 00:33:31.643482 systemd[1]: Starting systemd-userdbd.service... Sep 9 00:33:31.653978 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Sep 9 00:33:31.678801 systemd[1]: Started systemd-userdbd.service. Sep 9 00:33:31.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.688107 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 9 00:33:31.722351 systemd-networkd[1038]: lo: Link UP Sep 9 00:33:31.722361 systemd-networkd[1038]: lo: Gained carrier Sep 9 00:33:31.722720 systemd-networkd[1038]: Enumeration completed Sep 9 00:33:31.722870 systemd[1]: Started systemd-networkd.service. Sep 9 00:33:31.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.723704 systemd-networkd[1038]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 9 00:33:31.724856 systemd-networkd[1038]: eth0: Link UP Sep 9 00:33:31.724865 systemd-networkd[1038]: eth0: Gained carrier Sep 9 00:33:31.726107 systemd[1]: Finished systemd-udev-settle.service. Sep 9 00:33:31.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.727939 systemd[1]: Starting lvm2-activation-early.service... Sep 9 00:33:31.736109 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 9 00:33:31.746947 systemd-networkd[1038]: eth0: DHCPv4 address 10.0.0.76/16, gateway 10.0.0.1 acquired from 10.0.0.1 Sep 9 00:33:31.767663 systemd[1]: Finished lvm2-activation-early.service. Sep 9 00:33:31.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.768589 systemd[1]: Reached target cryptsetup.target. Sep 9 00:33:31.770420 systemd[1]: Starting lvm2-activation.service... Sep 9 00:33:31.774088 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 9 00:33:31.801822 systemd[1]: Finished lvm2-activation.service. Sep 9 00:33:31.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.802575 systemd[1]: Reached target local-fs-pre.target. Sep 9 00:33:31.803270 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 9 00:33:31.803296 systemd[1]: Reached target local-fs.target. Sep 9 00:33:31.803892 systemd[1]: Reached target machines.target. Sep 9 00:33:31.805644 systemd[1]: Starting ldconfig.service... Sep 9 00:33:31.806689 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:33:31.806744 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:33:31.807737 systemd[1]: Starting systemd-boot-update.service... Sep 9 00:33:31.809460 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 9 00:33:31.811339 systemd[1]: Starting systemd-machine-id-commit.service... Sep 9 00:33:31.814445 systemd[1]: Starting systemd-sysext.service... Sep 9 00:33:31.815435 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1068 (bootctl) Sep 9 00:33:31.817979 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 9 00:33:31.820196 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 9 00:33:31.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.824451 systemd[1]: Unmounting usr-share-oem.mount... Sep 9 00:33:31.831170 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 9 00:33:31.831376 systemd[1]: Unmounted usr-share-oem.mount. Sep 9 00:33:31.846797 kernel: loop0: detected capacity change from 0 to 203944 Sep 9 00:33:31.895199 systemd[1]: Finished systemd-machine-id-commit.service. Sep 9 00:33:31.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.902816 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 9 00:33:31.918237 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) Sep 9 00:33:31.918237 systemd-fsck[1077]: /dev/vda1: 236 files, 117310/258078 clusters Sep 9 00:33:31.920080 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 9 00:33:31.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.922791 kernel: loop1: detected capacity change from 0 to 203944 Sep 9 00:33:31.933595 (sd-sysext)[1080]: Using extensions 'kubernetes'. Sep 9 00:33:31.933970 (sd-sysext)[1080]: Merged extensions into '/usr'. Sep 9 00:33:31.951221 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:33:31.952410 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:33:31.954156 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:33:31.956099 systemd[1]: Starting modprobe@loop.service... Sep 9 00:33:31.957040 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:33:31.957207 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:33:31.957971 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:33:31.958101 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:33:31.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.959156 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:33:31.959259 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:33:31.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.960511 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:33:31.960614 systemd[1]: Finished modprobe@loop.service. Sep 9 00:33:31.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:31.961844 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 9 00:33:31.961943 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.015021 ldconfig[1067]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 9 00:33:32.018700 systemd[1]: Finished ldconfig.service. Sep 9 00:33:32.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.176582 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 9 00:33:32.178263 systemd[1]: Mounting boot.mount... Sep 9 00:33:32.179923 systemd[1]: Mounting usr-share-oem.mount... Sep 9 00:33:32.186376 systemd[1]: Mounted boot.mount. Sep 9 00:33:32.187311 systemd[1]: Mounted usr-share-oem.mount. Sep 9 00:33:32.189047 systemd[1]: Finished systemd-sysext.service. Sep 9 00:33:32.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.191659 systemd[1]: Starting ensure-sysext.service... Sep 9 00:33:32.193569 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 9 00:33:32.194737 systemd[1]: Finished systemd-boot-update.service. Sep 9 00:33:32.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.198528 systemd[1]: Reloading. Sep 9 00:33:32.206700 systemd-tmpfiles[1088]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 9 00:33:32.209330 systemd-tmpfiles[1088]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 9 00:33:32.213458 systemd-tmpfiles[1088]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 9 00:33:32.233240 /usr/lib/systemd/system-generators/torcx-generator[1108]: time="2025-09-09T00:33:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 9 00:33:32.236581 /usr/lib/systemd/system-generators/torcx-generator[1108]: time="2025-09-09T00:33:32Z" level=info msg="torcx already run" Sep 9 00:33:32.297683 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 9 00:33:32.297700 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 9 00:33:32.314290 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 9 00:33:32.359000 audit: BPF prog-id=24 op=LOAD Sep 9 00:33:32.359000 audit: BPF prog-id=15 op=UNLOAD Sep 9 00:33:32.359000 audit: BPF prog-id=25 op=LOAD Sep 9 00:33:32.360000 audit: BPF prog-id=26 op=LOAD Sep 9 00:33:32.360000 audit: BPF prog-id=16 op=UNLOAD Sep 9 00:33:32.360000 audit: BPF prog-id=17 op=UNLOAD Sep 9 00:33:32.360000 audit: BPF prog-id=27 op=LOAD Sep 9 00:33:32.360000 audit: BPF prog-id=21 op=UNLOAD Sep 9 00:33:32.360000 audit: BPF prog-id=28 op=LOAD Sep 9 00:33:32.360000 audit: BPF prog-id=29 op=LOAD Sep 9 00:33:32.360000 audit: BPF prog-id=22 op=UNLOAD Sep 9 00:33:32.360000 audit: BPF prog-id=23 op=UNLOAD Sep 9 00:33:32.361000 audit: BPF prog-id=30 op=LOAD Sep 9 00:33:32.361000 audit: BPF prog-id=31 op=LOAD Sep 9 00:33:32.361000 audit: BPF prog-id=18 op=UNLOAD Sep 9 00:33:32.361000 audit: BPF prog-id=19 op=UNLOAD Sep 9 00:33:32.361000 audit: BPF prog-id=32 op=LOAD Sep 9 00:33:32.361000 audit: BPF prog-id=20 op=UNLOAD Sep 9 00:33:32.364874 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 9 00:33:32.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.369094 systemd[1]: Starting audit-rules.service... Sep 9 00:33:32.370837 systemd[1]: Starting clean-ca-certificates.service... Sep 9 00:33:32.372909 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 9 00:33:32.373000 audit: BPF prog-id=33 op=LOAD Sep 9 00:33:32.375223 systemd[1]: Starting systemd-resolved.service... Sep 9 00:33:32.375000 audit: BPF prog-id=34 op=LOAD Sep 9 00:33:32.377335 systemd[1]: Starting systemd-timesyncd.service... Sep 9 00:33:32.379423 systemd[1]: Starting systemd-update-utmp.service... Sep 9 00:33:32.380873 systemd[1]: Finished clean-ca-certificates.service. Sep 9 00:33:32.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.383525 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:33:32.384000 audit[1156]: SYSTEM_BOOT pid=1156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.387071 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.388504 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:33:32.391607 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:33:32.393734 systemd[1]: Starting modprobe@loop.service... Sep 9 00:33:32.394567 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.394744 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:33:32.394927 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:33:32.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.396246 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 9 00:33:32.397561 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:33:32.397682 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:33:32.398967 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:33:32.399087 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:33:32.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.400476 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:33:32.400586 systemd[1]: Finished modprobe@loop.service. Sep 9 00:33:32.403469 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.404885 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:33:32.406530 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:33:32.408373 systemd[1]: Starting modprobe@loop.service... Sep 9 00:33:32.409053 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.409175 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:33:32.410818 systemd[1]: Starting systemd-update-done.service... Sep 9 00:33:32.411524 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:33:32.412543 systemd[1]: Finished systemd-update-utmp.service. Sep 9 00:33:32.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.413725 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:33:32.413864 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:33:32.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.414873 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:33:32.414995 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:33:32.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.416069 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:33:32.416183 systemd[1]: Finished modprobe@loop.service. Sep 9 00:33:32.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.418155 systemd[1]: Finished systemd-update-done.service. Sep 9 00:33:32.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:32.420000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 9 00:33:32.420000 audit[1174]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc9667ce0 a2=420 a3=0 items=0 ppid=1147 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:32.420000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 9 00:33:32.421299 augenrules[1174]: No rules Sep 9 00:33:32.421487 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.422854 systemd[1]: Starting modprobe@dm_mod.service... Sep 9 00:33:32.424548 systemd[1]: Starting modprobe@drm.service... Sep 9 00:33:32.426469 systemd[1]: Starting modprobe@efi_pstore.service... Sep 9 00:33:32.428755 systemd[1]: Starting modprobe@loop.service... Sep 9 00:33:32.429433 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.429551 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:33:32.430811 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 9 00:33:32.431646 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 9 00:33:32.432721 systemd[1]: Finished audit-rules.service. Sep 9 00:33:32.433966 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 9 00:33:32.434083 systemd[1]: Finished modprobe@dm_mod.service. Sep 9 00:33:32.435145 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 9 00:33:32.435259 systemd[1]: Finished modprobe@drm.service. Sep 9 00:33:32.436353 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 9 00:33:32.436476 systemd[1]: Finished modprobe@efi_pstore.service. Sep 9 00:33:32.436642 systemd-resolved[1151]: Positive Trust Anchors: Sep 9 00:33:32.436652 systemd-resolved[1151]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 9 00:33:32.436678 systemd-resolved[1151]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 9 00:33:32.437711 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 9 00:33:32.437853 systemd[1]: Finished modprobe@loop.service. Sep 9 00:33:32.439125 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 9 00:33:32.439226 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.440313 systemd[1]: Finished ensure-sysext.service. Sep 9 00:33:32.444370 systemd[1]: Started systemd-timesyncd.service. Sep 9 00:33:32.445435 systemd[1]: Reached target time-set.target. Sep 9 00:33:32.445883 systemd-timesyncd[1152]: Contacted time server 10.0.0.1:123 (10.0.0.1). Sep 9 00:33:32.446196 systemd-timesyncd[1152]: Initial clock synchronization to Tue 2025-09-09 00:33:32.521469 UTC. Sep 9 00:33:32.446208 systemd-resolved[1151]: Defaulting to hostname 'linux'. Sep 9 00:33:32.447619 systemd[1]: Started systemd-resolved.service. Sep 9 00:33:32.448452 systemd[1]: Reached target network.target. Sep 9 00:33:32.449137 systemd[1]: Reached target nss-lookup.target. Sep 9 00:33:32.449811 systemd[1]: Reached target sysinit.target. Sep 9 00:33:32.450499 systemd[1]: Started motdgen.path. Sep 9 00:33:32.451185 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 9 00:33:32.452259 systemd[1]: Started logrotate.timer. Sep 9 00:33:32.452991 systemd[1]: Started mdadm.timer. Sep 9 00:33:32.453551 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 9 00:33:32.454297 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 9 00:33:32.454325 systemd[1]: Reached target paths.target. Sep 9 00:33:32.455002 systemd[1]: Reached target timers.target. Sep 9 00:33:32.455957 systemd[1]: Listening on dbus.socket. Sep 9 00:33:32.457632 systemd[1]: Starting docker.socket... Sep 9 00:33:32.460883 systemd[1]: Listening on sshd.socket. Sep 9 00:33:32.461622 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:33:32.462116 systemd[1]: Listening on docker.socket. Sep 9 00:33:32.462876 systemd[1]: Reached target sockets.target. Sep 9 00:33:32.463501 systemd[1]: Reached target basic.target. Sep 9 00:33:32.464181 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.464214 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 9 00:33:32.465220 systemd[1]: Starting containerd.service... Sep 9 00:33:32.466983 systemd[1]: Starting dbus.service... Sep 9 00:33:32.468522 systemd[1]: Starting enable-oem-cloudinit.service... Sep 9 00:33:32.470407 systemd[1]: Starting extend-filesystems.service... Sep 9 00:33:32.472716 jq[1189]: false Sep 9 00:33:32.471265 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 9 00:33:32.472362 systemd[1]: Starting motdgen.service... Sep 9 00:33:32.474170 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 9 00:33:32.475966 systemd[1]: Starting sshd-keygen.service... Sep 9 00:33:32.478949 systemd[1]: Starting systemd-logind.service... Sep 9 00:33:32.479628 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 9 00:33:32.479718 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 9 00:33:32.480178 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 9 00:33:32.480866 systemd[1]: Starting update-engine.service... Sep 9 00:33:32.483203 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 9 00:33:32.487134 jq[1202]: true Sep 9 00:33:32.487554 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 9 00:33:32.495408 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 9 00:33:32.495855 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 9 00:33:32.497950 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 9 00:33:32.504944 jq[1209]: true Sep 9 00:33:32.505710 extend-filesystems[1190]: Found loop1 Sep 9 00:33:32.508092 extend-filesystems[1190]: Found vda Sep 9 00:33:32.508092 extend-filesystems[1190]: Found vda1 Sep 9 00:33:32.508092 extend-filesystems[1190]: Found vda2 Sep 9 00:33:32.508092 extend-filesystems[1190]: Found vda3 Sep 9 00:33:32.508092 extend-filesystems[1190]: Found usr Sep 9 00:33:32.506969 systemd[1]: motdgen.service: Deactivated successfully. Sep 9 00:33:32.513332 extend-filesystems[1190]: Found vda4 Sep 9 00:33:32.513332 extend-filesystems[1190]: Found vda6 Sep 9 00:33:32.513332 extend-filesystems[1190]: Found vda7 Sep 9 00:33:32.513332 extend-filesystems[1190]: Found vda9 Sep 9 00:33:32.513332 extend-filesystems[1190]: Checking size of /dev/vda9 Sep 9 00:33:32.507144 systemd[1]: Finished motdgen.service. Sep 9 00:33:32.514393 dbus-daemon[1188]: [system] SELinux support is enabled Sep 9 00:33:32.514566 systemd[1]: Started dbus.service. Sep 9 00:33:32.517219 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 9 00:33:32.517250 systemd[1]: Reached target system-config.target. Sep 9 00:33:32.518530 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 9 00:33:32.518547 systemd[1]: Reached target user-config.target. Sep 9 00:33:32.526257 extend-filesystems[1190]: Resized partition /dev/vda9 Sep 9 00:33:32.528707 extend-filesystems[1234]: resize2fs 1.46.5 (30-Dec-2021) Sep 9 00:33:32.544807 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Sep 9 00:33:32.557284 update_engine[1200]: I0909 00:33:32.557054 1200 main.cc:92] Flatcar Update Engine starting Sep 9 00:33:32.559678 systemd[1]: Started update-engine.service. Sep 9 00:33:32.562952 systemd[1]: Started locksmithd.service. Sep 9 00:33:32.568309 update_engine[1200]: I0909 00:33:32.561964 1200 update_check_scheduler.cc:74] Next update check in 11m14s Sep 9 00:33:32.568002 systemd-logind[1199]: Watching system buttons on /dev/input/event0 (Power Button) Sep 9 00:33:32.568210 systemd-logind[1199]: New seat seat0. Sep 9 00:33:32.571117 systemd[1]: Started systemd-logind.service. Sep 9 00:33:32.576804 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Sep 9 00:33:32.577638 bash[1232]: Updated "/home/core/.ssh/authorized_keys" Sep 9 00:33:32.578677 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 9 00:33:32.601978 extend-filesystems[1234]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 9 00:33:32.601978 extend-filesystems[1234]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 9 00:33:32.601978 extend-filesystems[1234]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Sep 9 00:33:32.605796 extend-filesystems[1190]: Resized filesystem in /dev/vda9 Sep 9 00:33:32.603885 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 9 00:33:32.607558 env[1210]: time="2025-09-09T00:33:32.602045560Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 9 00:33:32.604098 systemd[1]: Finished extend-filesystems.service. Sep 9 00:33:32.623353 env[1210]: time="2025-09-09T00:33:32.623303320Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 9 00:33:32.623637 env[1210]: time="2025-09-09T00:33:32.623614960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:33:32.624927 env[1210]: time="2025-09-09T00:33:32.624892600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.191-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 9 00:33:32.625248 env[1210]: time="2025-09-09T00:33:32.625230640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:33:32.625560 env[1210]: time="2025-09-09T00:33:32.625530280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 9 00:33:32.625724 env[1210]: time="2025-09-09T00:33:32.625706600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 9 00:33:32.625831 env[1210]: time="2025-09-09T00:33:32.625811080Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 9 00:33:32.625891 env[1210]: time="2025-09-09T00:33:32.625876760Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 9 00:33:32.626078 env[1210]: time="2025-09-09T00:33:32.626025680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:33:32.626580 env[1210]: time="2025-09-09T00:33:32.626558160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 9 00:33:32.626833 env[1210]: time="2025-09-09T00:33:32.626809800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 9 00:33:32.626928 env[1210]: time="2025-09-09T00:33:32.626912240Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 9 00:33:32.627041 env[1210]: time="2025-09-09T00:33:32.627022440Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 9 00:33:32.627110 env[1210]: time="2025-09-09T00:33:32.627096200Z" level=info msg="metadata content store policy set" policy=shared Sep 9 00:33:32.630376 locksmithd[1237]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 9 00:33:32.631366 env[1210]: time="2025-09-09T00:33:32.631339960Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 9 00:33:32.631467 env[1210]: time="2025-09-09T00:33:32.631444000Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 9 00:33:32.631536 env[1210]: time="2025-09-09T00:33:32.631522360Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 9 00:33:32.631638 env[1210]: time="2025-09-09T00:33:32.631621200Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.631721 env[1210]: time="2025-09-09T00:33:32.631699560Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.631820 env[1210]: time="2025-09-09T00:33:32.631803080Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.631888 env[1210]: time="2025-09-09T00:33:32.631873840Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.632306 env[1210]: time="2025-09-09T00:33:32.632275640Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.632418 env[1210]: time="2025-09-09T00:33:32.632397800Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.632487 env[1210]: time="2025-09-09T00:33:32.632471720Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.632546 env[1210]: time="2025-09-09T00:33:32.632533160Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.632606 env[1210]: time="2025-09-09T00:33:32.632592720Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 9 00:33:32.632828 env[1210]: time="2025-09-09T00:33:32.632759560Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 9 00:33:32.633026 env[1210]: time="2025-09-09T00:33:32.633005760Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 9 00:33:32.633348 env[1210]: time="2025-09-09T00:33:32.633326040Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 9 00:33:32.633450 env[1210]: time="2025-09-09T00:33:32.633432280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.633512 env[1210]: time="2025-09-09T00:33:32.633499520Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 9 00:33:32.633730 env[1210]: time="2025-09-09T00:33:32.633713880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.633821 env[1210]: time="2025-09-09T00:33:32.633804800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.633887 env[1210]: time="2025-09-09T00:33:32.633873240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.633961 env[1210]: time="2025-09-09T00:33:32.633947320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634024 env[1210]: time="2025-09-09T00:33:32.634009280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634080 env[1210]: time="2025-09-09T00:33:32.634066360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634144 env[1210]: time="2025-09-09T00:33:32.634130640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634200 env[1210]: time="2025-09-09T00:33:32.634187520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634299 env[1210]: time="2025-09-09T00:33:32.634268920Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 9 00:33:32.634492 env[1210]: time="2025-09-09T00:33:32.634471520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634626 env[1210]: time="2025-09-09T00:33:32.634586800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634726 env[1210]: time="2025-09-09T00:33:32.634710960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.634814 env[1210]: time="2025-09-09T00:33:32.634794760Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 9 00:33:32.634910 env[1210]: time="2025-09-09T00:33:32.634886040Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 9 00:33:32.634970 env[1210]: time="2025-09-09T00:33:32.634956680Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 9 00:33:32.635034 env[1210]: time="2025-09-09T00:33:32.635018920Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 9 00:33:32.635119 env[1210]: time="2025-09-09T00:33:32.635104000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 9 00:33:32.635415 env[1210]: time="2025-09-09T00:33:32.635355280Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 9 00:33:32.636102 env[1210]: time="2025-09-09T00:33:32.635813560Z" level=info msg="Connect containerd service" Sep 9 00:33:32.636102 env[1210]: time="2025-09-09T00:33:32.635857040Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 9 00:33:32.636849 env[1210]: time="2025-09-09T00:33:32.636819160Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 9 00:33:32.637183 env[1210]: time="2025-09-09T00:33:32.637135520Z" level=info msg="Start subscribing containerd event" Sep 9 00:33:32.637225 env[1210]: time="2025-09-09T00:33:32.637198320Z" level=info msg="Start recovering state" Sep 9 00:33:32.637284 env[1210]: time="2025-09-09T00:33:32.637267320Z" level=info msg="Start event monitor" Sep 9 00:33:32.637321 env[1210]: time="2025-09-09T00:33:32.637292080Z" level=info msg="Start snapshots syncer" Sep 9 00:33:32.637321 env[1210]: time="2025-09-09T00:33:32.637303240Z" level=info msg="Start cni network conf syncer for default" Sep 9 00:33:32.637321 env[1210]: time="2025-09-09T00:33:32.637311440Z" level=info msg="Start streaming server" Sep 9 00:33:32.638001 env[1210]: time="2025-09-09T00:33:32.637948400Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 9 00:33:32.638062 env[1210]: time="2025-09-09T00:33:32.638032680Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 9 00:33:32.638110 env[1210]: time="2025-09-09T00:33:32.638089560Z" level=info msg="containerd successfully booted in 0.048772s" Sep 9 00:33:32.638186 systemd[1]: Started containerd.service. Sep 9 00:33:32.892973 systemd-networkd[1038]: eth0: Gained IPv6LL Sep 9 00:33:32.894563 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 9 00:33:32.895622 systemd[1]: Reached target network-online.target. Sep 9 00:33:32.897950 systemd[1]: Starting kubelet.service... Sep 9 00:33:33.488160 systemd[1]: Started kubelet.service. Sep 9 00:33:33.887439 kubelet[1252]: E0909 00:33:33.887333 1252 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 9 00:33:33.889290 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 9 00:33:33.889420 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 9 00:33:33.991559 sshd_keygen[1205]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 9 00:33:34.010321 systemd[1]: Finished sshd-keygen.service. Sep 9 00:33:34.012507 systemd[1]: Starting issuegen.service... Sep 9 00:33:34.017540 systemd[1]: issuegen.service: Deactivated successfully. Sep 9 00:33:34.017702 systemd[1]: Finished issuegen.service. Sep 9 00:33:34.019824 systemd[1]: Starting systemd-user-sessions.service... Sep 9 00:33:34.026282 systemd[1]: Finished systemd-user-sessions.service. Sep 9 00:33:34.028578 systemd[1]: Started getty@tty1.service. Sep 9 00:33:34.030637 systemd[1]: Started serial-getty@ttyAMA0.service. Sep 9 00:33:34.031611 systemd[1]: Reached target getty.target. Sep 9 00:33:34.032378 systemd[1]: Reached target multi-user.target. Sep 9 00:33:34.034380 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 9 00:33:34.042269 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 9 00:33:34.042446 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 9 00:33:34.043609 systemd[1]: Startup finished in 605ms (kernel) + 4.565s (initrd) + 4.906s (userspace) = 10.077s. Sep 9 00:33:37.666397 systemd[1]: Created slice system-sshd.slice. Sep 9 00:33:37.667530 systemd[1]: Started sshd@0-10.0.0.76:22-10.0.0.1:45454.service. Sep 9 00:33:37.727057 sshd[1274]: Accepted publickey for core from 10.0.0.1 port 45454 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:33:37.733452 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:37.745866 systemd[1]: Created slice user-500.slice. Sep 9 00:33:37.747112 systemd[1]: Starting user-runtime-dir@500.service... Sep 9 00:33:37.750577 systemd-logind[1199]: New session 1 of user core. Sep 9 00:33:37.756400 systemd[1]: Finished user-runtime-dir@500.service. Sep 9 00:33:37.758095 systemd[1]: Starting user@500.service... Sep 9 00:33:37.762490 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:37.837048 systemd[1277]: Queued start job for default target default.target. Sep 9 00:33:37.837551 systemd[1277]: Reached target paths.target. Sep 9 00:33:37.837583 systemd[1277]: Reached target sockets.target. Sep 9 00:33:37.837594 systemd[1277]: Reached target timers.target. Sep 9 00:33:37.837604 systemd[1277]: Reached target basic.target. Sep 9 00:33:37.837646 systemd[1277]: Reached target default.target. Sep 9 00:33:37.837669 systemd[1277]: Startup finished in 68ms. Sep 9 00:33:37.837756 systemd[1]: Started user@500.service. Sep 9 00:33:37.838753 systemd[1]: Started session-1.scope. Sep 9 00:33:37.896931 systemd[1]: Started sshd@1-10.0.0.76:22-10.0.0.1:45462.service. Sep 9 00:33:37.936042 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 45462 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:33:37.937355 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:37.942390 systemd-logind[1199]: New session 2 of user core. Sep 9 00:33:37.943719 systemd[1]: Started session-2.scope. Sep 9 00:33:38.005979 sshd[1286]: pam_unix(sshd:session): session closed for user core Sep 9 00:33:38.009205 systemd[1]: Started sshd@2-10.0.0.76:22-10.0.0.1:45476.service. Sep 9 00:33:38.009713 systemd[1]: sshd@1-10.0.0.76:22-10.0.0.1:45462.service: Deactivated successfully. Sep 9 00:33:38.010417 systemd[1]: session-2.scope: Deactivated successfully. Sep 9 00:33:38.010973 systemd-logind[1199]: Session 2 logged out. Waiting for processes to exit. Sep 9 00:33:38.011930 systemd-logind[1199]: Removed session 2. Sep 9 00:33:38.041687 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 45476 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:33:38.043463 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:38.048276 systemd-logind[1199]: New session 3 of user core. Sep 9 00:33:38.049009 systemd[1]: Started session-3.scope. Sep 9 00:33:38.109441 sshd[1291]: pam_unix(sshd:session): session closed for user core Sep 9 00:33:38.113540 systemd[1]: sshd@2-10.0.0.76:22-10.0.0.1:45476.service: Deactivated successfully. Sep 9 00:33:38.121077 systemd[1]: session-3.scope: Deactivated successfully. Sep 9 00:33:38.122409 systemd-logind[1199]: Session 3 logged out. Waiting for processes to exit. Sep 9 00:33:38.124856 systemd[1]: Started sshd@3-10.0.0.76:22-10.0.0.1:45484.service. Sep 9 00:33:38.127867 systemd-logind[1199]: Removed session 3. Sep 9 00:33:38.160245 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 45484 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:33:38.161940 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:38.169293 systemd-logind[1199]: New session 4 of user core. Sep 9 00:33:38.169334 systemd[1]: Started session-4.scope. Sep 9 00:33:38.232231 sshd[1298]: pam_unix(sshd:session): session closed for user core Sep 9 00:33:38.236398 systemd[1]: sshd@3-10.0.0.76:22-10.0.0.1:45484.service: Deactivated successfully. Sep 9 00:33:38.237215 systemd[1]: session-4.scope: Deactivated successfully. Sep 9 00:33:38.237975 systemd-logind[1199]: Session 4 logged out. Waiting for processes to exit. Sep 9 00:33:38.239467 systemd[1]: Started sshd@4-10.0.0.76:22-10.0.0.1:45494.service. Sep 9 00:33:38.240512 systemd-logind[1199]: Removed session 4. Sep 9 00:33:38.283495 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 45494 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:33:38.286117 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:38.296375 systemd-logind[1199]: New session 5 of user core. Sep 9 00:33:38.302948 systemd[1]: Started session-5.scope. Sep 9 00:33:38.373750 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 9 00:33:38.373997 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:33:38.386023 dbus-daemon[1188]: avc: received setenforce notice (enforcing=1) Sep 9 00:33:38.387785 sudo[1308]: pam_unix(sudo:session): session closed for user root Sep 9 00:33:38.389845 sshd[1304]: pam_unix(sshd:session): session closed for user core Sep 9 00:33:38.394749 systemd[1]: sshd@4-10.0.0.76:22-10.0.0.1:45494.service: Deactivated successfully. Sep 9 00:33:38.395720 systemd[1]: session-5.scope: Deactivated successfully. Sep 9 00:33:38.400876 systemd-logind[1199]: Session 5 logged out. Waiting for processes to exit. Sep 9 00:33:38.402004 systemd[1]: Started sshd@5-10.0.0.76:22-10.0.0.1:45500.service. Sep 9 00:33:38.402982 systemd-logind[1199]: Removed session 5. Sep 9 00:33:38.438016 sshd[1312]: Accepted publickey for core from 10.0.0.1 port 45500 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:33:38.439752 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:38.444077 systemd-logind[1199]: New session 6 of user core. Sep 9 00:33:38.444851 systemd[1]: Started session-6.scope. Sep 9 00:33:38.503646 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 9 00:33:38.504534 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:33:38.507505 sudo[1316]: pam_unix(sudo:session): session closed for user root Sep 9 00:33:38.516946 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 9 00:33:38.517166 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:33:38.528458 systemd[1]: Stopping audit-rules.service... Sep 9 00:33:38.528000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 9 00:33:38.530155 kernel: kauditd_printk_skb: 148 callbacks suppressed Sep 9 00:33:38.530191 kernel: audit: type=1305 audit(1757378018.528:195): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 9 00:33:38.528000 audit[1319]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd5d9cd90 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:38.534989 kernel: audit: type=1300 audit(1757378018.528:195): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd5d9cd90 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:38.535042 kernel: audit: type=1327 audit(1757378018.528:195): proctitle=2F7362696E2F617564697463746C002D44 Sep 9 00:33:38.528000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 9 00:33:38.535125 auditctl[1319]: No rules Sep 9 00:33:38.535504 systemd[1]: audit-rules.service: Deactivated successfully. Sep 9 00:33:38.535679 systemd[1]: Stopped audit-rules.service. Sep 9 00:33:38.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.537480 systemd[1]: Starting audit-rules.service... Sep 9 00:33:38.538311 kernel: audit: type=1131 audit(1757378018.534:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.558243 augenrules[1336]: No rules Sep 9 00:33:38.559251 systemd[1]: Finished audit-rules.service. Sep 9 00:33:38.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.561504 sudo[1315]: pam_unix(sudo:session): session closed for user root Sep 9 00:33:38.560000 audit[1315]: USER_END pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.563611 sshd[1312]: pam_unix(sshd:session): session closed for user core Sep 9 00:33:38.565999 kernel: audit: type=1130 audit(1757378018.558:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.566049 kernel: audit: type=1106 audit(1757378018.560:198): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.566081 kernel: audit: type=1104 audit(1757378018.560:199): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.560000 audit[1315]: CRED_DISP pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.566644 systemd[1]: sshd@5-10.0.0.76:22-10.0.0.1:45500.service: Deactivated successfully. Sep 9 00:33:38.567390 systemd[1]: session-6.scope: Deactivated successfully. Sep 9 00:33:38.562000 audit[1312]: USER_END pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.571483 systemd[1]: Started sshd@6-10.0.0.76:22-10.0.0.1:45502.service. Sep 9 00:33:38.571953 kernel: audit: type=1106 audit(1757378018.562:200): pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.571997 kernel: audit: type=1104 audit(1757378018.562:201): pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.562000 audit[1312]: CRED_DISP pid=1312 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.571841 systemd-logind[1199]: Session 6 logged out. Waiting for processes to exit. Sep 9 00:33:38.572514 systemd-logind[1199]: Removed session 6. Sep 9 00:33:38.573990 kernel: audit: type=1131 audit(1757378018.566:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.76:22-10.0.0.1:45500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.76:22-10.0.0.1:45500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.76:22-10.0.0.1:45502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.601000 audit[1342]: USER_ACCT pid=1342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.602944 sshd[1342]: Accepted publickey for core from 10.0.0.1 port 45502 ssh2: RSA SHA256:SJL83fEN2Ip3G6nq+SFahxwHER39rSdiWTx9teXxMXo Sep 9 00:33:38.603000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.603000 audit[1342]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0ca2d30 a2=3 a3=1 items=0 ppid=1 pid=1342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:38.603000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 9 00:33:38.604513 sshd[1342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 9 00:33:38.608759 systemd[1]: Started session-7.scope. Sep 9 00:33:38.608869 systemd-logind[1199]: New session 7 of user core. Sep 9 00:33:38.611000 audit[1342]: USER_START pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.612000 audit[1344]: CRED_ACQ pid=1344 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:38.660000 audit[1345]: USER_ACCT pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.662194 sudo[1345]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 9 00:33:38.660000 audit[1345]: CRED_REFR pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.662741 sudo[1345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 9 00:33:38.662000 audit[1345]: USER_START pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.675160 systemd[1]: Starting coreos-metadata.service... Sep 9 00:33:38.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:38.681601 systemd[1]: coreos-metadata.service: Deactivated successfully. Sep 9 00:33:38.681816 systemd[1]: Finished coreos-metadata.service. Sep 9 00:33:39.144117 systemd[1]: Stopped kubelet.service. Sep 9 00:33:39.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:39.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:39.146281 systemd[1]: Starting kubelet.service... Sep 9 00:33:39.168285 systemd[1]: Reloading. Sep 9 00:33:39.232857 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-09-09T00:33:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 9 00:33:39.232887 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-09-09T00:33:39Z" level=info msg="torcx already run" Sep 9 00:33:39.481330 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 9 00:33:39.481351 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 9 00:33:39.498135 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit: BPF prog-id=40 op=LOAD Sep 9 00:33:39.553000 audit: BPF prog-id=34 op=UNLOAD Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit: BPF prog-id=41 op=LOAD Sep 9 00:33:39.554000 audit: BPF prog-id=24 op=UNLOAD Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit: BPF prog-id=42 op=LOAD Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit: BPF prog-id=43 op=LOAD Sep 9 00:33:39.555000 audit: BPF prog-id=25 op=UNLOAD Sep 9 00:33:39.555000 audit: BPF prog-id=26 op=UNLOAD Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit: BPF prog-id=44 op=LOAD Sep 9 00:33:39.555000 audit: BPF prog-id=27 op=UNLOAD Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit: BPF prog-id=45 op=LOAD Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit: BPF prog-id=46 op=LOAD Sep 9 00:33:39.556000 audit: BPF prog-id=28 op=UNLOAD Sep 9 00:33:39.556000 audit: BPF prog-id=29 op=UNLOAD Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit: BPF prog-id=47 op=LOAD Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.556000 audit: BPF prog-id=48 op=LOAD Sep 9 00:33:39.556000 audit: BPF prog-id=30 op=UNLOAD Sep 9 00:33:39.556000 audit: BPF prog-id=31 op=UNLOAD Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.557000 audit: BPF prog-id=49 op=LOAD Sep 9 00:33:39.557000 audit: BPF prog-id=38 op=UNLOAD Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.558000 audit: BPF prog-id=50 op=LOAD Sep 9 00:33:39.558000 audit: BPF prog-id=32 op=UNLOAD Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.559000 audit: BPF prog-id=51 op=LOAD Sep 9 00:33:39.559000 audit: BPF prog-id=33 op=UNLOAD Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit: BPF prog-id=52 op=LOAD Sep 9 00:33:39.561000 audit: BPF prog-id=35 op=UNLOAD Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit: BPF prog-id=53 op=LOAD Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:39.562000 audit: BPF prog-id=54 op=LOAD Sep 9 00:33:39.562000 audit: BPF prog-id=36 op=UNLOAD Sep 9 00:33:39.562000 audit: BPF prog-id=37 op=UNLOAD Sep 9 00:33:39.575305 systemd[1]: Started kubelet.service. Sep 9 00:33:39.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:39.577308 systemd[1]: Stopping kubelet.service... Sep 9 00:33:39.577715 systemd[1]: kubelet.service: Deactivated successfully. Sep 9 00:33:39.577952 systemd[1]: Stopped kubelet.service. Sep 9 00:33:39.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:39.579724 systemd[1]: Starting kubelet.service... Sep 9 00:33:39.678047 systemd[1]: Started kubelet.service. Sep 9 00:33:39.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:39.717325 kubelet[1447]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 9 00:33:39.717325 kubelet[1447]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 9 00:33:39.717325 kubelet[1447]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 9 00:33:39.717683 kubelet[1447]: I0909 00:33:39.717366 1447 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 9 00:33:40.407299 kubelet[1447]: I0909 00:33:40.407248 1447 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 9 00:33:40.407299 kubelet[1447]: I0909 00:33:40.407284 1447 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 9 00:33:40.407547 kubelet[1447]: I0909 00:33:40.407519 1447 server.go:934] "Client rotation is on, will bootstrap in background" Sep 9 00:33:40.432978 kubelet[1447]: I0909 00:33:40.432933 1447 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 9 00:33:40.447294 kubelet[1447]: E0909 00:33:40.447254 1447 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 9 00:33:40.447294 kubelet[1447]: I0909 00:33:40.447292 1447 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 9 00:33:40.451007 kubelet[1447]: I0909 00:33:40.450968 1447 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 9 00:33:40.452880 kubelet[1447]: I0909 00:33:40.452857 1447 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 9 00:33:40.453054 kubelet[1447]: I0909 00:33:40.453024 1447 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 9 00:33:40.453272 kubelet[1447]: I0909 00:33:40.453054 1447 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.76","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 9 00:33:40.453354 kubelet[1447]: I0909 00:33:40.453340 1447 topology_manager.go:138] "Creating topology manager with none policy" Sep 9 00:33:40.453354 kubelet[1447]: I0909 00:33:40.453351 1447 container_manager_linux.go:300] "Creating device plugin manager" Sep 9 00:33:40.453587 kubelet[1447]: I0909 00:33:40.453575 1447 state_mem.go:36] "Initialized new in-memory state store" Sep 9 00:33:40.455743 kubelet[1447]: I0909 00:33:40.455715 1447 kubelet.go:408] "Attempting to sync node with API server" Sep 9 00:33:40.455743 kubelet[1447]: I0909 00:33:40.455746 1447 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 9 00:33:40.455833 kubelet[1447]: I0909 00:33:40.455803 1447 kubelet.go:314] "Adding apiserver pod source" Sep 9 00:33:40.456096 kubelet[1447]: I0909 00:33:40.456080 1447 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 9 00:33:40.461922 kubelet[1447]: E0909 00:33:40.461885 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:40.462029 kubelet[1447]: E0909 00:33:40.461977 1447 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:40.475657 kubelet[1447]: I0909 00:33:40.475627 1447 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 9 00:33:40.476465 kubelet[1447]: I0909 00:33:40.476435 1447 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 9 00:33:40.476562 kubelet[1447]: W0909 00:33:40.476550 1447 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 9 00:33:40.477576 kubelet[1447]: I0909 00:33:40.477548 1447 server.go:1274] "Started kubelet" Sep 9 00:33:40.478593 kubelet[1447]: I0909 00:33:40.478547 1447 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 9 00:33:40.478948 kubelet[1447]: I0909 00:33:40.478930 1447 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 9 00:33:40.479073 kubelet[1447]: I0909 00:33:40.479055 1447 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 9 00:33:40.480425 kubelet[1447]: I0909 00:33:40.480390 1447 server.go:449] "Adding debug handlers to kubelet server" Sep 9 00:33:40.481000 audit[1447]: AVC avc: denied { mac_admin } for pid=1447 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:40.481000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 9 00:33:40.481000 audit[1447]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000557cb0 a1=40009d6ee8 a2=4000557bf0 a3=25 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 9 00:33:40.481000 audit[1447]: AVC avc: denied { mac_admin } for pid=1447 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:40.481000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 9 00:33:40.481000 audit[1447]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000933300 a1=40009d6f00 a2=4000557f20 a3=25 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 9 00:33:40.482415 kubelet[1447]: I0909 00:33:40.482142 1447 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 9 00:33:40.482415 kubelet[1447]: I0909 00:33:40.482176 1447 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 9 00:33:40.482415 kubelet[1447]: I0909 00:33:40.482258 1447 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 9 00:33:40.482594 kubelet[1447]: I0909 00:33:40.482573 1447 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 9 00:33:40.485332 kubelet[1447]: E0909 00:33:40.485307 1447 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 9 00:33:40.489955 kubelet[1447]: I0909 00:33:40.489924 1447 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 9 00:33:40.490038 kubelet[1447]: I0909 00:33:40.490025 1447 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 9 00:33:40.490124 kubelet[1447]: I0909 00:33:40.490114 1447 reconciler.go:26] "Reconciler: start to sync state" Sep 9 00:33:40.490595 kubelet[1447]: E0909 00:33:40.490551 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.76\" not found" Sep 9 00:33:40.491895 kubelet[1447]: I0909 00:33:40.491867 1447 factory.go:221] Registration of the systemd container factory successfully Sep 9 00:33:40.492036 kubelet[1447]: I0909 00:33:40.492015 1447 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 9 00:33:40.493984 kubelet[1447]: I0909 00:33:40.493956 1447 factory.go:221] Registration of the containerd container factory successfully Sep 9 00:33:40.495834 kubelet[1447]: E0909 00:33:40.495791 1447 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.76\" not found" node="10.0.0.76" Sep 9 00:33:40.504035 kubelet[1447]: I0909 00:33:40.503942 1447 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 9 00:33:40.504035 kubelet[1447]: I0909 00:33:40.504027 1447 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 9 00:33:40.504167 kubelet[1447]: I0909 00:33:40.504052 1447 state_mem.go:36] "Initialized new in-memory state store" Sep 9 00:33:40.591329 kubelet[1447]: E0909 00:33:40.591284 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.76\" not found" Sep 9 00:33:40.605242 kubelet[1447]: I0909 00:33:40.605217 1447 policy_none.go:49] "None policy: Start" Sep 9 00:33:40.606035 kubelet[1447]: I0909 00:33:40.606017 1447 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 9 00:33:40.606142 kubelet[1447]: I0909 00:33:40.606131 1447 state_mem.go:35] "Initializing new in-memory state store" Sep 9 00:33:40.611817 systemd[1]: Created slice kubepods.slice. Sep 9 00:33:40.616430 systemd[1]: Created slice kubepods-burstable.slice. Sep 9 00:33:40.619076 systemd[1]: Created slice kubepods-besteffort.slice. Sep 9 00:33:40.619000 audit[1465]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.619000 audit[1465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff3cb3a50 a2=0 a3=1 items=0 ppid=1447 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 9 00:33:40.620000 audit[1468]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.620000 audit[1468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc4adc550 a2=0 a3=1 items=0 ppid=1447 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 9 00:33:40.625621 kubelet[1447]: I0909 00:33:40.625581 1447 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 9 00:33:40.623000 audit[1447]: AVC avc: denied { mac_admin } for pid=1447 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:40.623000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 9 00:33:40.623000 audit[1447]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000927b00 a1=4000bd5c20 a2=4000927ad0 a3=25 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.623000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 9 00:33:40.625880 kubelet[1447]: I0909 00:33:40.625644 1447 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 9 00:33:40.625880 kubelet[1447]: I0909 00:33:40.625796 1447 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 9 00:33:40.625880 kubelet[1447]: I0909 00:33:40.625809 1447 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 9 00:33:40.627806 kubelet[1447]: I0909 00:33:40.627766 1447 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 9 00:33:40.628949 kubelet[1447]: E0909 00:33:40.628901 1447 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.76\" not found" Sep 9 00:33:40.622000 audit[1470]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.622000 audit[1470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffa2f83f0 a2=0 a3=1 items=0 ppid=1447 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:33:40.647000 audit[1476]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.647000 audit[1476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc9546ab0 a2=0 a3=1 items=0 ppid=1447 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:33:40.680000 audit[1481]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.680000 audit[1481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff4be9900 a2=0 a3=1 items=0 ppid=1447 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 9 00:33:40.681522 kubelet[1447]: I0909 00:33:40.681278 1447 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 9 00:33:40.681000 audit[1482]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:40.681000 audit[1482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc5eef560 a2=0 a3=1 items=0 ppid=1447 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 9 00:33:40.682627 kubelet[1447]: I0909 00:33:40.682598 1447 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 9 00:33:40.682714 kubelet[1447]: I0909 00:33:40.682703 1447 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 9 00:33:40.681000 audit[1483]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.681000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd91821b0 a2=0 a3=1 items=0 ppid=1447 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 9 00:33:40.682907 kubelet[1447]: I0909 00:33:40.682894 1447 kubelet.go:2321] "Starting kubelet main sync loop" Sep 9 00:33:40.683116 kubelet[1447]: E0909 00:33:40.683099 1447 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 9 00:33:40.683000 audit[1484]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:40.683000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8bc4b80 a2=0 a3=1 items=0 ppid=1447 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 9 00:33:40.683000 audit[1485]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.683000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc76d3500 a2=0 a3=1 items=0 ppid=1447 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 9 00:33:40.684000 audit[1486]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:40.684000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcca134e0 a2=0 a3=1 items=0 ppid=1447 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 9 00:33:40.684000 audit[1487]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:40.684000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff95619b0 a2=0 a3=1 items=0 ppid=1447 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 9 00:33:40.686000 audit[1488]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:40.686000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff2305f10 a2=0 a3=1 items=0 ppid=1447 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:40.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 9 00:33:40.727609 kubelet[1447]: I0909 00:33:40.727572 1447 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.76" Sep 9 00:33:40.733167 kubelet[1447]: I0909 00:33:40.733132 1447 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.76" Sep 9 00:33:40.844136 kubelet[1447]: I0909 00:33:40.844102 1447 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 9 00:33:40.844508 env[1210]: time="2025-09-09T00:33:40.844457946Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 9 00:33:40.844762 kubelet[1447]: I0909 00:33:40.844657 1447 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 9 00:33:41.205167 sudo[1345]: pam_unix(sudo:session): session closed for user root Sep 9 00:33:41.204000 audit[1345]: USER_END pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:41.204000 audit[1345]: CRED_DISP pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 9 00:33:41.206983 sshd[1342]: pam_unix(sshd:session): session closed for user core Sep 9 00:33:41.209000 audit[1342]: USER_END pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:41.209000 audit[1342]: CRED_DISP pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 9 00:33:41.211699 systemd[1]: sshd@6-10.0.0.76:22-10.0.0.1:45502.service: Deactivated successfully. Sep 9 00:33:41.212372 systemd[1]: session-7.scope: Deactivated successfully. Sep 9 00:33:41.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.76:22-10.0.0.1:45502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 9 00:33:41.213451 systemd-logind[1199]: Session 7 logged out. Waiting for processes to exit. Sep 9 00:33:41.215411 systemd-logind[1199]: Removed session 7. Sep 9 00:33:41.409180 kubelet[1447]: I0909 00:33:41.409097 1447 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 9 00:33:41.409408 kubelet[1447]: W0909 00:33:41.409387 1447 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 9 00:33:41.410245 kubelet[1447]: W0909 00:33:41.409405 1447 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 9 00:33:41.410245 kubelet[1447]: W0909 00:33:41.409426 1447 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 9 00:33:41.463320 kubelet[1447]: I0909 00:33:41.462842 1447 apiserver.go:52] "Watching apiserver" Sep 9 00:33:41.463546 kubelet[1447]: E0909 00:33:41.462890 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:41.469730 kubelet[1447]: E0909 00:33:41.469690 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvffn" podUID="4d11223a-0369-4cc9-aeb9-b1d2d8273939" Sep 9 00:33:41.481464 systemd[1]: Created slice kubepods-besteffort-podd2927edd_bff0_45ce_9a52_c790a248f963.slice. Sep 9 00:33:41.491916 kubelet[1447]: I0909 00:33:41.491884 1447 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 9 00:33:41.496785 kubelet[1447]: I0909 00:33:41.496724 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pl69m\" (UniqueName: \"kubernetes.io/projected/b922985d-a59e-4a29-9e96-a422729287a6-kube-api-access-pl69m\") pod \"kube-proxy-c5vln\" (UID: \"b922985d-a59e-4a29-9e96-a422729287a6\") " pod="kube-system/kube-proxy-c5vln" Sep 9 00:33:41.496971 kubelet[1447]: I0909 00:33:41.496954 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-cni-bin-dir\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.497043 kubelet[1447]: I0909 00:33:41.497030 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-lib-modules\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.497105 kubelet[1447]: I0909 00:33:41.497095 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4d11223a-0369-4cc9-aeb9-b1d2d8273939-kubelet-dir\") pod \"csi-node-driver-qvffn\" (UID: \"4d11223a-0369-4cc9-aeb9-b1d2d8273939\") " pod="calico-system/csi-node-driver-qvffn" Sep 9 00:33:41.497172 kubelet[1447]: I0909 00:33:41.497159 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4d11223a-0369-4cc9-aeb9-b1d2d8273939-registration-dir\") pod \"csi-node-driver-qvffn\" (UID: \"4d11223a-0369-4cc9-aeb9-b1d2d8273939\") " pod="calico-system/csi-node-driver-qvffn" Sep 9 00:33:41.497357 kubelet[1447]: I0909 00:33:41.497342 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4d11223a-0369-4cc9-aeb9-b1d2d8273939-varrun\") pod \"csi-node-driver-qvffn\" (UID: \"4d11223a-0369-4cc9-aeb9-b1d2d8273939\") " pod="calico-system/csi-node-driver-qvffn" Sep 9 00:33:41.497437 kubelet[1447]: I0909 00:33:41.497425 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b922985d-a59e-4a29-9e96-a422729287a6-xtables-lock\") pod \"kube-proxy-c5vln\" (UID: \"b922985d-a59e-4a29-9e96-a422729287a6\") " pod="kube-system/kube-proxy-c5vln" Sep 9 00:33:41.497499 kubelet[1447]: I0909 00:33:41.497487 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-var-lib-calico\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.497564 kubelet[1447]: I0909 00:33:41.497553 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-xtables-lock\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.497967 kubelet[1447]: I0909 00:33:41.497946 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4d11223a-0369-4cc9-aeb9-b1d2d8273939-socket-dir\") pod \"csi-node-driver-qvffn\" (UID: \"4d11223a-0369-4cc9-aeb9-b1d2d8273939\") " pod="calico-system/csi-node-driver-qvffn" Sep 9 00:33:41.498088 kubelet[1447]: I0909 00:33:41.498073 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-flexvol-driver-host\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498162 kubelet[1447]: I0909 00:33:41.498150 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2927edd-bff0-45ce-9a52-c790a248f963-tigera-ca-bundle\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498224 kubelet[1447]: I0909 00:33:41.498213 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-var-run-calico\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498292 kubelet[1447]: I0909 00:33:41.498280 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65r5g\" (UniqueName: \"kubernetes.io/projected/d2927edd-bff0-45ce-9a52-c790a248f963-kube-api-access-65r5g\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498362 kubelet[1447]: I0909 00:33:41.498343 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b922985d-a59e-4a29-9e96-a422729287a6-lib-modules\") pod \"kube-proxy-c5vln\" (UID: \"b922985d-a59e-4a29-9e96-a422729287a6\") " pod="kube-system/kube-proxy-c5vln" Sep 9 00:33:41.498445 kubelet[1447]: I0909 00:33:41.498432 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-cni-log-dir\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498512 kubelet[1447]: I0909 00:33:41.498501 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-cni-net-dir\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498576 kubelet[1447]: I0909 00:33:41.498564 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d2927edd-bff0-45ce-9a52-c790a248f963-node-certs\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498640 kubelet[1447]: I0909 00:33:41.498627 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d2927edd-bff0-45ce-9a52-c790a248f963-policysync\") pod \"calico-node-92rj9\" (UID: \"d2927edd-bff0-45ce-9a52-c790a248f963\") " pod="calico-system/calico-node-92rj9" Sep 9 00:33:41.498823 kubelet[1447]: I0909 00:33:41.498795 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bgrkc\" (UniqueName: \"kubernetes.io/projected/4d11223a-0369-4cc9-aeb9-b1d2d8273939-kube-api-access-bgrkc\") pod \"csi-node-driver-qvffn\" (UID: \"4d11223a-0369-4cc9-aeb9-b1d2d8273939\") " pod="calico-system/csi-node-driver-qvffn" Sep 9 00:33:41.498935 kubelet[1447]: I0909 00:33:41.498919 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b922985d-a59e-4a29-9e96-a422729287a6-kube-proxy\") pod \"kube-proxy-c5vln\" (UID: \"b922985d-a59e-4a29-9e96-a422729287a6\") " pod="kube-system/kube-proxy-c5vln" Sep 9 00:33:41.512491 systemd[1]: Created slice kubepods-besteffort-podb922985d_a59e_4a29_9e96_a422729287a6.slice. Sep 9 00:33:41.601283 kubelet[1447]: I0909 00:33:41.600874 1447 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 9 00:33:41.602043 kubelet[1447]: E0909 00:33:41.601830 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.602043 kubelet[1447]: W0909 00:33:41.601849 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.602043 kubelet[1447]: E0909 00:33:41.601870 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.602483 kubelet[1447]: E0909 00:33:41.602119 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.602483 kubelet[1447]: W0909 00:33:41.602129 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.602483 kubelet[1447]: E0909 00:33:41.602142 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.602483 kubelet[1447]: E0909 00:33:41.602319 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.602483 kubelet[1447]: W0909 00:33:41.602328 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.602483 kubelet[1447]: E0909 00:33:41.602339 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.602620 kubelet[1447]: E0909 00:33:41.602524 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.602620 kubelet[1447]: W0909 00:33:41.602533 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.602620 kubelet[1447]: E0909 00:33:41.602543 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.602942 kubelet[1447]: E0909 00:33:41.602744 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.602942 kubelet[1447]: W0909 00:33:41.602758 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.602942 kubelet[1447]: E0909 00:33:41.602795 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.603447 kubelet[1447]: E0909 00:33:41.602972 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.603447 kubelet[1447]: W0909 00:33:41.602981 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.603447 kubelet[1447]: E0909 00:33:41.602991 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.603447 kubelet[1447]: E0909 00:33:41.603127 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.603447 kubelet[1447]: W0909 00:33:41.603134 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.603447 kubelet[1447]: E0909 00:33:41.603181 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.603447 kubelet[1447]: E0909 00:33:41.603254 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.603447 kubelet[1447]: W0909 00:33:41.603261 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.603447 kubelet[1447]: E0909 00:33:41.603298 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.603447 kubelet[1447]: E0909 00:33:41.603427 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.603649 kubelet[1447]: W0909 00:33:41.603433 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.603649 kubelet[1447]: E0909 00:33:41.603473 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.603649 kubelet[1447]: E0909 00:33:41.603569 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.603649 kubelet[1447]: W0909 00:33:41.603576 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.603649 kubelet[1447]: E0909 00:33:41.603627 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.606000 kubelet[1447]: E0909 00:33:41.603946 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.606000 kubelet[1447]: W0909 00:33:41.603956 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.606000 kubelet[1447]: E0909 00:33:41.604012 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.606000 kubelet[1447]: E0909 00:33:41.604698 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.606000 kubelet[1447]: W0909 00:33:41.604715 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.606000 kubelet[1447]: E0909 00:33:41.604731 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.606000 kubelet[1447]: E0909 00:33:41.605420 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.606000 kubelet[1447]: W0909 00:33:41.605436 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.606000 kubelet[1447]: E0909 00:33:41.605492 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.606000 kubelet[1447]: E0909 00:33:41.605810 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.606245 kubelet[1447]: W0909 00:33:41.605827 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.606245 kubelet[1447]: E0909 00:33:41.605907 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.606245 kubelet[1447]: E0909 00:33:41.606065 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.606245 kubelet[1447]: W0909 00:33:41.606077 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.606245 kubelet[1447]: E0909 00:33:41.606143 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.606372 kubelet[1447]: E0909 00:33:41.606352 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.606372 kubelet[1447]: W0909 00:33:41.606369 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.606439 kubelet[1447]: E0909 00:33:41.606423 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.607100 kubelet[1447]: E0909 00:33:41.606665 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.607100 kubelet[1447]: W0909 00:33:41.606696 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.607100 kubelet[1447]: E0909 00:33:41.606781 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.607100 kubelet[1447]: E0909 00:33:41.606923 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.607100 kubelet[1447]: W0909 00:33:41.606933 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.607100 kubelet[1447]: E0909 00:33:41.606946 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.607656 kubelet[1447]: E0909 00:33:41.607583 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.607656 kubelet[1447]: W0909 00:33:41.607605 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.607656 kubelet[1447]: E0909 00:33:41.607624 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.608240 kubelet[1447]: E0909 00:33:41.608220 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.608326 kubelet[1447]: W0909 00:33:41.608311 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.608394 kubelet[1447]: E0909 00:33:41.608382 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.608687 kubelet[1447]: E0909 00:33:41.608667 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.608687 kubelet[1447]: W0909 00:33:41.608685 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.608762 kubelet[1447]: E0909 00:33:41.608703 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.611474 kubelet[1447]: E0909 00:33:41.611432 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.611474 kubelet[1447]: W0909 00:33:41.611460 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.611610 kubelet[1447]: E0909 00:33:41.611486 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.615834 kubelet[1447]: E0909 00:33:41.612390 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.615834 kubelet[1447]: W0909 00:33:41.612411 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.615834 kubelet[1447]: E0909 00:33:41.612426 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.623314 kubelet[1447]: E0909 00:33:41.623289 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.623448 kubelet[1447]: W0909 00:33:41.623433 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.623520 kubelet[1447]: E0909 00:33:41.623506 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.629755 kubelet[1447]: E0909 00:33:41.629733 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.629906 kubelet[1447]: W0909 00:33:41.629889 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.629971 kubelet[1447]: E0909 00:33:41.629958 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.634894 kubelet[1447]: E0909 00:33:41.634867 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 9 00:33:41.634894 kubelet[1447]: W0909 00:33:41.634891 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 9 00:33:41.635001 kubelet[1447]: E0909 00:33:41.634911 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 9 00:33:41.816536 kubelet[1447]: E0909 00:33:41.814332 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:33:41.820670 env[1210]: time="2025-09-09T00:33:41.815122034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c5vln,Uid:b922985d-a59e-4a29-9e96-a422729287a6,Namespace:kube-system,Attempt:0,}" Sep 9 00:33:41.820670 env[1210]: time="2025-09-09T00:33:41.820162843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-92rj9,Uid:d2927edd-bff0-45ce-9a52-c790a248f963,Namespace:calico-system,Attempt:0,}" Sep 9 00:33:42.462784 env[1210]: time="2025-09-09T00:33:42.462719934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.464602 kubelet[1447]: E0909 00:33:42.464448 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:42.467429 env[1210]: time="2025-09-09T00:33:42.467371444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.469176 env[1210]: time="2025-09-09T00:33:42.469057104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.476435 env[1210]: time="2025-09-09T00:33:42.476380871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.478155 env[1210]: time="2025-09-09T00:33:42.478025334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.480092 env[1210]: time="2025-09-09T00:33:42.480027611Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.484126 env[1210]: time="2025-09-09T00:33:42.484085317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.489161 env[1210]: time="2025-09-09T00:33:42.489112933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:42.523096 env[1210]: time="2025-09-09T00:33:42.522830301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:33:42.523096 env[1210]: time="2025-09-09T00:33:42.522922883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:33:42.523096 env[1210]: time="2025-09-09T00:33:42.522937685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:33:42.523653 env[1210]: time="2025-09-09T00:33:42.523602531Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca pid=1541 runtime=io.containerd.runc.v2 Sep 9 00:33:42.523821 env[1210]: time="2025-09-09T00:33:42.523754642Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:33:42.523887 env[1210]: time="2025-09-09T00:33:42.523833145Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:33:42.523917 env[1210]: time="2025-09-09T00:33:42.523880599Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:33:42.524484 env[1210]: time="2025-09-09T00:33:42.524402559Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/444fe5d2077ed4290b4295e93f3fa54e5be4b1be3c48c149f5ca781e8748098b pid=1540 runtime=io.containerd.runc.v2 Sep 9 00:33:42.545838 systemd[1]: Started cri-containerd-0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca.scope. Sep 9 00:33:42.546788 systemd[1]: Started cri-containerd-444fe5d2077ed4290b4295e93f3fa54e5be4b1be3c48c149f5ca781e8748098b.scope. Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.563000 audit: BPF prog-id=55 op=LOAD Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1541 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393763303266386361633238626533366466613762376566326531 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1541 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393763303266386361633238626533366466613762376566326531 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit: BPF prog-id=56 op=LOAD Sep 9 00:33:42.564000 audit[1559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1541 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393763303266386361633238626533366466613762376566326531 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.564000 audit: BPF prog-id=57 op=LOAD Sep 9 00:33:42.564000 audit[1559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1541 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393763303266386361633238626533366466613762376566326531 Sep 9 00:33:42.566000 audit: BPF prog-id=57 op=UNLOAD Sep 9 00:33:42.566000 audit: BPF prog-id=56 op=UNLOAD Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.566000 audit: BPF prog-id=58 op=LOAD Sep 9 00:33:42.566000 audit[1559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1541 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393763303266386361633238626533366466613762376566326531 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.571000 audit: BPF prog-id=59 op=LOAD Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1540 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434346665356432303737656434323930623432393565393366336661 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1540 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434346665356432303737656434323930623432393565393366336661 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit: BPF prog-id=60 op=LOAD Sep 9 00:33:42.572000 audit[1561]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1540 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434346665356432303737656434323930623432393565393366336661 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit: BPF prog-id=61 op=LOAD Sep 9 00:33:42.572000 audit[1561]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1540 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434346665356432303737656434323930623432393565393366336661 Sep 9 00:33:42.572000 audit: BPF prog-id=61 op=UNLOAD Sep 9 00:33:42.572000 audit: BPF prog-id=60 op=UNLOAD Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { perfmon } for pid=1561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit[1561]: AVC avc: denied { bpf } for pid=1561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:42.572000 audit: BPF prog-id=62 op=LOAD Sep 9 00:33:42.572000 audit[1561]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1540 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:42.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434346665356432303737656434323930623432393565393366336661 Sep 9 00:33:42.585879 env[1210]: time="2025-09-09T00:33:42.585834433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-92rj9,Uid:d2927edd-bff0-45ce-9a52-c790a248f963,Namespace:calico-system,Attempt:0,} returns sandbox id \"0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca\"" Sep 9 00:33:42.588902 env[1210]: time="2025-09-09T00:33:42.588862499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 9 00:33:42.591360 env[1210]: time="2025-09-09T00:33:42.591312887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-c5vln,Uid:b922985d-a59e-4a29-9e96-a422729287a6,Namespace:kube-system,Attempt:0,} returns sandbox id \"444fe5d2077ed4290b4295e93f3fa54e5be4b1be3c48c149f5ca781e8748098b\"" Sep 9 00:33:42.592045 kubelet[1447]: E0909 00:33:42.591952 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:33:42.613633 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3383205832.mount: Deactivated successfully. Sep 9 00:33:43.465589 kubelet[1447]: E0909 00:33:43.465533 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:43.683679 kubelet[1447]: E0909 00:33:43.683406 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvffn" podUID="4d11223a-0369-4cc9-aeb9-b1d2d8273939" Sep 9 00:33:43.846433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1276705728.mount: Deactivated successfully. Sep 9 00:33:43.960053 env[1210]: time="2025-09-09T00:33:43.959997734Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:43.961715 env[1210]: time="2025-09-09T00:33:43.961684961Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:43.963178 env[1210]: time="2025-09-09T00:33:43.963151160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:43.964754 env[1210]: time="2025-09-09T00:33:43.964728876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:43.965253 env[1210]: time="2025-09-09T00:33:43.965223544Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 9 00:33:43.967244 env[1210]: time="2025-09-09T00:33:43.966865660Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\"" Sep 9 00:33:43.968975 env[1210]: time="2025-09-09T00:33:43.968919277Z" level=info msg="CreateContainer within sandbox \"0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 9 00:33:43.983015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount263824295.mount: Deactivated successfully. Sep 9 00:33:43.989693 env[1210]: time="2025-09-09T00:33:43.989643033Z" level=info msg="CreateContainer within sandbox \"0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa\"" Sep 9 00:33:43.990888 env[1210]: time="2025-09-09T00:33:43.990761489Z" level=info msg="StartContainer for \"40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa\"" Sep 9 00:33:44.013782 systemd[1]: Started cri-containerd-40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa.scope. Sep 9 00:33:44.042851 kernel: kauditd_printk_skb: 357 callbacks suppressed Sep 9 00:33:44.042983 kernel: audit: type=1400 audit(1757378024.034:447): avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.043006 kernel: audit: type=1300 audit(1757378024.034:447): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1541 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:44.034000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.034000 audit[1617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1541 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:44.046201 kernel: audit: type=1327 audit(1757378024.034:447): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643233333830663736333761306564373964613661343530313164 Sep 9 00:33:44.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643233333830663736333761306564373964613661343530313164 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.053514 kernel: audit: type=1400 audit(1757378024.035:448): avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.053626 kernel: audit: type=1400 audit(1757378024.035:448): avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.057887 kernel: audit: type=1400 audit(1757378024.035:448): avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.057942 kernel: audit: type=1400 audit(1757378024.035:448): avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.059908 kernel: audit: type=1400 audit(1757378024.035:448): avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.064912 kernel: audit: type=1400 audit(1757378024.035:448): avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.064991 kernel: audit: type=1400 audit(1757378024.035:448): avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.035000 audit: BPF prog-id=63 op=LOAD Sep 9 00:33:44.035000 audit[1617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1541 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:44.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643233333830663736333761306564373964613661343530313164 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.045000 audit: BPF prog-id=64 op=LOAD Sep 9 00:33:44.045000 audit[1617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1541 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:44.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643233333830663736333761306564373964613661343530313164 Sep 9 00:33:44.049000 audit: BPF prog-id=64 op=UNLOAD Sep 9 00:33:44.049000 audit: BPF prog-id=63 op=UNLOAD Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:44.049000 audit: BPF prog-id=65 op=LOAD Sep 9 00:33:44.049000 audit[1617]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1541 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:44.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430643233333830663736333761306564373964613661343530313164 Sep 9 00:33:44.080140 env[1210]: time="2025-09-09T00:33:44.080099178Z" level=info msg="StartContainer for \"40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa\" returns successfully" Sep 9 00:33:44.087963 systemd[1]: cri-containerd-40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa.scope: Deactivated successfully. Sep 9 00:33:44.091000 audit: BPF prog-id=65 op=UNLOAD Sep 9 00:33:44.142389 env[1210]: time="2025-09-09T00:33:44.142281464Z" level=info msg="shim disconnected" id=40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa Sep 9 00:33:44.142389 env[1210]: time="2025-09-09T00:33:44.142326161Z" level=warning msg="cleaning up after shim disconnected" id=40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa namespace=k8s.io Sep 9 00:33:44.142389 env[1210]: time="2025-09-09T00:33:44.142336865Z" level=info msg="cleaning up dead shim" Sep 9 00:33:44.148792 env[1210]: time="2025-09-09T00:33:44.148745707Z" level=warning msg="cleanup warnings time=\"2025-09-09T00:33:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1655 runtime=io.containerd.runc.v2\n" Sep 9 00:33:44.466735 kubelet[1447]: E0909 00:33:44.466609 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:44.807031 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-40d23380f7637a0ed79da6a45011d0901cfd78974de544d3bd55c41f72d340fa-rootfs.mount: Deactivated successfully. Sep 9 00:33:45.136515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount580093125.mount: Deactivated successfully. Sep 9 00:33:45.469120 kubelet[1447]: E0909 00:33:45.468977 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:45.625745 env[1210]: time="2025-09-09T00:33:45.625690756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:45.629764 env[1210]: time="2025-09-09T00:33:45.629736088Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:25c7652bd0d893b147dce9135dc6a68c37da76f9a20dceec1d520782031b2f36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:45.631510 env[1210]: time="2025-09-09T00:33:45.631483731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:45.633383 env[1210]: time="2025-09-09T00:33:45.633333528Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\" returns image reference \"sha256:25c7652bd0d893b147dce9135dc6a68c37da76f9a20dceec1d520782031b2f36\"" Sep 9 00:33:45.633592 env[1210]: time="2025-09-09T00:33:45.633561201Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:90aa6b5f4065937521ff8438bc705317485d0be3f8b00a07145e697d92cc2cc6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:45.635259 env[1210]: time="2025-09-09T00:33:45.635145173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 9 00:33:45.637010 env[1210]: time="2025-09-09T00:33:45.636966075Z" level=info msg="CreateContainer within sandbox \"444fe5d2077ed4290b4295e93f3fa54e5be4b1be3c48c149f5ca781e8748098b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 9 00:33:45.651368 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount165154564.mount: Deactivated successfully. Sep 9 00:33:45.657878 env[1210]: time="2025-09-09T00:33:45.657836558Z" level=info msg="CreateContainer within sandbox \"444fe5d2077ed4290b4295e93f3fa54e5be4b1be3c48c149f5ca781e8748098b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c0f8bf3d1051472cc1c639a8844612721417dc291374f050e4b9ba3e05b0b3ec\"" Sep 9 00:33:45.658425 env[1210]: time="2025-09-09T00:33:45.658304728Z" level=info msg="StartContainer for \"c0f8bf3d1051472cc1c639a8844612721417dc291374f050e4b9ba3e05b0b3ec\"" Sep 9 00:33:45.677359 systemd[1]: Started cri-containerd-c0f8bf3d1051472cc1c639a8844612721417dc291374f050e4b9ba3e05b0b3ec.scope. Sep 9 00:33:45.684725 kubelet[1447]: E0909 00:33:45.683877 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvffn" podUID="4d11223a-0369-4cc9-aeb9-b1d2d8273939" Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1540 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663862663364313035313437326363316336333961383834343631 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit: BPF prog-id=66 op=LOAD Sep 9 00:33:45.701000 audit[1682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1540 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663862663364313035313437326363316336333961383834343631 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit: BPF prog-id=67 op=LOAD Sep 9 00:33:45.701000 audit[1682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1540 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663862663364313035313437326363316336333961383834343631 Sep 9 00:33:45.701000 audit: BPF prog-id=67 op=UNLOAD Sep 9 00:33:45.701000 audit: BPF prog-id=66 op=UNLOAD Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:45.701000 audit: BPF prog-id=68 op=LOAD Sep 9 00:33:45.701000 audit[1682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1540 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663862663364313035313437326363316336333961383834343631 Sep 9 00:33:45.727832 env[1210]: time="2025-09-09T00:33:45.726908290Z" level=info msg="StartContainer for \"c0f8bf3d1051472cc1c639a8844612721417dc291374f050e4b9ba3e05b0b3ec\" returns successfully" Sep 9 00:33:45.897000 audit[1742]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:45.897000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb108a90 a2=0 a3=1 items=0 ppid=1692 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 9 00:33:45.898000 audit[1743]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:45.898000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6e46180 a2=0 a3=1 items=0 ppid=1692 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 9 00:33:45.898000 audit[1745]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:45.898000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4e6ccf0 a2=0 a3=1 items=0 ppid=1692 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 9 00:33:45.899000 audit[1747]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:45.899000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd2064b90 a2=0 a3=1 items=0 ppid=1692 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 9 00:33:45.900000 audit[1746]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:45.900000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1ef6580 a2=0 a3=1 items=0 ppid=1692 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 9 00:33:45.901000 audit[1748]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:45.901000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe2c5def0 a2=0 a3=1 items=0 ppid=1692 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:45.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 9 00:33:46.002000 audit[1749]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.002000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffcb8b740 a2=0 a3=1 items=0 ppid=1692 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 9 00:33:46.005000 audit[1751]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.005000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff5df3350 a2=0 a3=1 items=0 ppid=1692 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 9 00:33:46.008000 audit[1754]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.008000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc5cb0900 a2=0 a3=1 items=0 ppid=1692 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 9 00:33:46.009000 audit[1755]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.009000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3784040 a2=0 a3=1 items=0 ppid=1692 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 9 00:33:46.011000 audit[1757]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.011000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc38842c0 a2=0 a3=1 items=0 ppid=1692 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 9 00:33:46.012000 audit[1758]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.012000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2b84600 a2=0 a3=1 items=0 ppid=1692 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 9 00:33:46.015000 audit[1760]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.015000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd66f92c0 a2=0 a3=1 items=0 ppid=1692 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 9 00:33:46.018000 audit[1763]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.018000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdd514550 a2=0 a3=1 items=0 ppid=1692 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 9 00:33:46.019000 audit[1764]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.019000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff5131c0 a2=0 a3=1 items=0 ppid=1692 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 9 00:33:46.021000 audit[1766]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.021000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc96063f0 a2=0 a3=1 items=0 ppid=1692 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 9 00:33:46.022000 audit[1767]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.022000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1a5c240 a2=0 a3=1 items=0 ppid=1692 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 9 00:33:46.025000 audit[1769]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.025000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc21b4520 a2=0 a3=1 items=0 ppid=1692 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 9 00:33:46.028000 audit[1772]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.028000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc26277f0 a2=0 a3=1 items=0 ppid=1692 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 9 00:33:46.032000 audit[1775]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.032000 audit[1775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc86e5d60 a2=0 a3=1 items=0 ppid=1692 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 9 00:33:46.033000 audit[1776]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.033000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc59c7d80 a2=0 a3=1 items=0 ppid=1692 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 9 00:33:46.035000 audit[1778]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.035000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe699a170 a2=0 a3=1 items=0 ppid=1692 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:33:46.064000 audit[1782]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.064000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc27e1250 a2=0 a3=1 items=0 ppid=1692 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:33:46.065000 audit[1783]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.065000 audit[1783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9a198b0 a2=0 a3=1 items=0 ppid=1692 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 9 00:33:46.068000 audit[1785]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 9 00:33:46.068000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc29a3090 a2=0 a3=1 items=0 ppid=1692 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 9 00:33:46.091000 audit[1791]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:33:46.091000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc26fe520 a2=0 a3=1 items=0 ppid=1692 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:33:46.116000 audit[1791]: NETFILTER_CFG table=nat:40 family=2 entries=72 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:33:46.116000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=34516 a0=3 a1=ffffc26fe520 a2=0 a3=1 items=0 ppid=1692 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:33:46.126000 audit[1801]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.126000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffc397520 a2=0 a3=1 items=0 ppid=1692 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 9 00:33:46.128000 audit[1804]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.128000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff33a8020 a2=0 a3=1 items=0 ppid=1692 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 9 00:33:46.131000 audit[1807]: NETFILTER_CFG table=filter:43 family=2 entries=9 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:33:46.131000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffa38e6f0 a2=0 a3=1 items=0 ppid=1692 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:33:46.137000 audit[1808]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.137000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe1ab49c0 a2=0 a3=1 items=0 ppid=1692 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 9 00:33:46.137000 audit[1807]: NETFILTER_CFG table=nat:45 family=2 entries=31 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:33:46.137000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=fffffa38e6f0 a2=0 a3=1 items=0 ppid=1692 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:33:46.138000 audit[1809]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.138000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec15be00 a2=0 a3=1 items=0 ppid=1692 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 9 00:33:46.150000 audit[1811]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.150000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee03b420 a2=0 a3=1 items=0 ppid=1692 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 9 00:33:46.151000 audit[1812]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.151000 audit[1812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2871000 a2=0 a3=1 items=0 ppid=1692 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 9 00:33:46.153000 audit[1814]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.153000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdeb0c0b0 a2=0 a3=1 items=0 ppid=1692 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 9 00:33:46.156000 audit[1817]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.156000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffec847940 a2=0 a3=1 items=0 ppid=1692 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 9 00:33:46.157000 audit[1818]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.157000 audit[1818]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5117510 a2=0 a3=1 items=0 ppid=1692 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 9 00:33:46.159000 audit[1820]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.159000 audit[1820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd2d48fe0 a2=0 a3=1 items=0 ppid=1692 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 9 00:33:46.160000 audit[1821]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.160000 audit[1821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe89cdb50 a2=0 a3=1 items=0 ppid=1692 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 9 00:33:46.162000 audit[1823]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.162000 audit[1823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe54d7f20 a2=0 a3=1 items=0 ppid=1692 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 9 00:33:46.166000 audit[1826]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.166000 audit[1826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcfaa1030 a2=0 a3=1 items=0 ppid=1692 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 9 00:33:46.169000 audit[1829]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.169000 audit[1829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffce1bb2d0 a2=0 a3=1 items=0 ppid=1692 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 9 00:33:46.170000 audit[1830]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.170000 audit[1830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffebae3ac0 a2=0 a3=1 items=0 ppid=1692 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 9 00:33:46.172000 audit[1832]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.172000 audit[1832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe50e14d0 a2=0 a3=1 items=0 ppid=1692 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:33:46.175000 audit[1835]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.175000 audit[1835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffa48c8d0 a2=0 a3=1 items=0 ppid=1692 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 9 00:33:46.176000 audit[1836]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.176000 audit[1836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc4b0e10 a2=0 a3=1 items=0 ppid=1692 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 9 00:33:46.179000 audit[1838]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.179000 audit[1838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe82becd0 a2=0 a3=1 items=0 ppid=1692 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 9 00:33:46.180000 audit[1839]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.180000 audit[1839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5c44070 a2=0 a3=1 items=0 ppid=1692 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 9 00:33:46.185000 audit[1841]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.185000 audit[1841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffebe353e0 a2=0 a3=1 items=0 ppid=1692 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:33:46.188000 audit[1844]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 9 00:33:46.188000 audit[1844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff05fd2d0 a2=0 a3=1 items=0 ppid=1692 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 9 00:33:46.191000 audit[1846]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 9 00:33:46.191000 audit[1846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe39381e0 a2=0 a3=1 items=0 ppid=1692 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.191000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:33:46.191000 audit[1846]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 9 00:33:46.191000 audit[1846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe39381e0 a2=0 a3=1 items=0 ppid=1692 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:46.191000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:33:46.470259 kubelet[1447]: E0909 00:33:46.470120 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:46.708865 kubelet[1447]: E0909 00:33:46.708829 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:33:47.470641 kubelet[1447]: E0909 00:33:47.470578 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:47.683967 kubelet[1447]: E0909 00:33:47.683619 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvffn" podUID="4d11223a-0369-4cc9-aeb9-b1d2d8273939" Sep 9 00:33:47.710466 kubelet[1447]: E0909 00:33:47.710103 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 9 00:33:48.403359 env[1210]: time="2025-09-09T00:33:48.402695274Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:48.404258 env[1210]: time="2025-09-09T00:33:48.404189979Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:48.407338 env[1210]: time="2025-09-09T00:33:48.407302105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:48.410618 env[1210]: time="2025-09-09T00:33:48.410587373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:48.411026 env[1210]: time="2025-09-09T00:33:48.410997896Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 9 00:33:48.416103 env[1210]: time="2025-09-09T00:33:48.415956616Z" level=info msg="CreateContainer within sandbox \"0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 9 00:33:48.442587 env[1210]: time="2025-09-09T00:33:48.442524279Z" level=info msg="CreateContainer within sandbox \"0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3\"" Sep 9 00:33:48.443379 env[1210]: time="2025-09-09T00:33:48.443325821Z" level=info msg="StartContainer for \"ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3\"" Sep 9 00:33:48.466107 systemd[1]: Started cri-containerd-ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3.scope. Sep 9 00:33:48.472055 kubelet[1447]: E0909 00:33:48.471452 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1541 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:48.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316434366262313263633230623862386532323533616439633432 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.485000 audit: BPF prog-id=69 op=LOAD Sep 9 00:33:48.485000 audit[1854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1541 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:48.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316434366262313263633230623862386532323533616439633432 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.491000 audit: BPF prog-id=70 op=LOAD Sep 9 00:33:48.491000 audit[1854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1541 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:48.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316434366262313263633230623862386532323533616439633432 Sep 9 00:33:48.492000 audit: BPF prog-id=70 op=UNLOAD Sep 9 00:33:48.492000 audit: BPF prog-id=69 op=UNLOAD Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:48.492000 audit: BPF prog-id=71 op=LOAD Sep 9 00:33:48.492000 audit[1854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1541 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:48.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316434366262313263633230623862386532323533616439633432 Sep 9 00:33:48.514467 env[1210]: time="2025-09-09T00:33:48.514392641Z" level=info msg="StartContainer for \"ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3\" returns successfully" Sep 9 00:33:48.735907 kubelet[1447]: I0909 00:33:48.735752 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-c5vln" podStartSLOduration=5.693636968 podStartE2EDuration="8.735733076s" podCreationTimestamp="2025-09-09 00:33:40 +0000 UTC" firstStartedPulling="2025-09-09 00:33:42.592422434 +0000 UTC m=+2.910457126" lastFinishedPulling="2025-09-09 00:33:45.634518501 +0000 UTC m=+5.952553234" observedRunningTime="2025-09-09 00:33:46.727115762 +0000 UTC m=+7.045150414" watchObservedRunningTime="2025-09-09 00:33:48.735733076 +0000 UTC m=+9.053767768" Sep 9 00:33:49.097151 systemd[1]: cri-containerd-ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3.scope: Deactivated successfully. Sep 9 00:33:49.103000 audit: BPF prog-id=71 op=UNLOAD Sep 9 00:33:49.105496 kernel: kauditd_printk_skb: 279 callbacks suppressed Sep 9 00:33:49.105600 kernel: audit: type=1334 audit(1757378029.103:519): prog-id=71 op=UNLOAD Sep 9 00:33:49.114350 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3-rootfs.mount: Deactivated successfully. Sep 9 00:33:49.121313 kubelet[1447]: I0909 00:33:49.121028 1447 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 9 00:33:49.264573 env[1210]: time="2025-09-09T00:33:49.264517540Z" level=info msg="shim disconnected" id=ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3 Sep 9 00:33:49.264573 env[1210]: time="2025-09-09T00:33:49.264563030Z" level=warning msg="cleaning up after shim disconnected" id=ad1d46bb12cc20b8b8e2253ad9c42f9dedde75489b772bca81900b8e8ee5e4d3 namespace=k8s.io Sep 9 00:33:49.264573 env[1210]: time="2025-09-09T00:33:49.264572120Z" level=info msg="cleaning up dead shim" Sep 9 00:33:49.271572 env[1210]: time="2025-09-09T00:33:49.271537850Z" level=warning msg="cleanup warnings time=\"2025-09-09T00:33:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1896 runtime=io.containerd.runc.v2\n" Sep 9 00:33:49.472205 kubelet[1447]: E0909 00:33:49.472061 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:49.688058 systemd[1]: Created slice kubepods-besteffort-pod4d11223a_0369_4cc9_aeb9_b1d2d8273939.slice. Sep 9 00:33:49.690360 env[1210]: time="2025-09-09T00:33:49.689997574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvffn,Uid:4d11223a-0369-4cc9-aeb9-b1d2d8273939,Namespace:calico-system,Attempt:0,}" Sep 9 00:33:49.719190 env[1210]: time="2025-09-09T00:33:49.719131191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 9 00:33:49.784745 env[1210]: time="2025-09-09T00:33:49.782834087Z" level=error msg="Failed to destroy network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:49.784745 env[1210]: time="2025-09-09T00:33:49.783384301Z" level=error msg="encountered an error cleaning up failed sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:49.784745 env[1210]: time="2025-09-09T00:33:49.783432074Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvffn,Uid:4d11223a-0369-4cc9-aeb9-b1d2d8273939,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:49.784199 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f-shm.mount: Deactivated successfully. Sep 9 00:33:49.785004 kubelet[1447]: E0909 00:33:49.783931 1447 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:49.785004 kubelet[1447]: E0909 00:33:49.784008 1447 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qvffn" Sep 9 00:33:49.785004 kubelet[1447]: E0909 00:33:49.784032 1447 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qvffn" Sep 9 00:33:49.785093 kubelet[1447]: E0909 00:33:49.784080 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qvffn_calico-system(4d11223a-0369-4cc9-aeb9-b1d2d8273939)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qvffn_calico-system(4d11223a-0369-4cc9-aeb9-b1d2d8273939)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qvffn" podUID="4d11223a-0369-4cc9-aeb9-b1d2d8273939" Sep 9 00:33:50.473157 kubelet[1447]: E0909 00:33:50.473091 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:50.720667 kubelet[1447]: I0909 00:33:50.720639 1447 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Sep 9 00:33:50.721344 env[1210]: time="2025-09-09T00:33:50.721305987Z" level=info msg="StopPodSandbox for \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\"" Sep 9 00:33:50.742851 env[1210]: time="2025-09-09T00:33:50.742696026Z" level=error msg="StopPodSandbox for \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\" failed" error="failed to destroy network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:50.743268 kubelet[1447]: E0909 00:33:50.743098 1447 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Sep 9 00:33:50.743268 kubelet[1447]: E0909 00:33:50.743161 1447 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f"} Sep 9 00:33:50.743268 kubelet[1447]: E0909 00:33:50.743215 1447 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d11223a-0369-4cc9-aeb9-b1d2d8273939\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 9 00:33:50.743268 kubelet[1447]: E0909 00:33:50.743236 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d11223a-0369-4cc9-aeb9-b1d2d8273939\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qvffn" podUID="4d11223a-0369-4cc9-aeb9-b1d2d8273939" Sep 9 00:33:51.473758 kubelet[1447]: E0909 00:33:51.473710 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:52.474955 kubelet[1447]: E0909 00:33:52.474924 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:52.477706 systemd[1]: Created slice kubepods-besteffort-pod05160a75_b9ce_4d3d_b486_13987693f6f1.slice. Sep 9 00:33:52.486847 kubelet[1447]: I0909 00:33:52.486789 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwv5g\" (UniqueName: \"kubernetes.io/projected/05160a75-b9ce-4d3d-b486-13987693f6f1-kube-api-access-pwv5g\") pod \"nginx-deployment-8587fbcb89-qc44z\" (UID: \"05160a75-b9ce-4d3d-b486-13987693f6f1\") " pod="default/nginx-deployment-8587fbcb89-qc44z" Sep 9 00:33:52.781287 env[1210]: time="2025-09-09T00:33:52.780919605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qc44z,Uid:05160a75-b9ce-4d3d-b486-13987693f6f1,Namespace:default,Attempt:0,}" Sep 9 00:33:52.845295 env[1210]: time="2025-09-09T00:33:52.845226436Z" level=error msg="Failed to destroy network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:52.847280 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387-shm.mount: Deactivated successfully. Sep 9 00:33:52.849355 env[1210]: time="2025-09-09T00:33:52.849289753Z" level=error msg="encountered an error cleaning up failed sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:52.849411 env[1210]: time="2025-09-09T00:33:52.849372855Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qc44z,Uid:05160a75-b9ce-4d3d-b486-13987693f6f1,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:52.849990 kubelet[1447]: E0909 00:33:52.849621 1447 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:52.849990 kubelet[1447]: E0909 00:33:52.849684 1447 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-qc44z" Sep 9 00:33:52.849990 kubelet[1447]: E0909 00:33:52.849707 1447 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-qc44z" Sep 9 00:33:52.850121 kubelet[1447]: E0909 00:33:52.849745 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-qc44z_default(05160a75-b9ce-4d3d-b486-13987693f6f1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-qc44z_default(05160a75-b9ce-4d3d-b486-13987693f6f1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-qc44z" podUID="05160a75-b9ce-4d3d-b486-13987693f6f1" Sep 9 00:33:53.475497 kubelet[1447]: E0909 00:33:53.475425 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:53.730903 kubelet[1447]: I0909 00:33:53.729252 1447 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Sep 9 00:33:53.732018 env[1210]: time="2025-09-09T00:33:53.731958175Z" level=info msg="StopPodSandbox for \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\"" Sep 9 00:33:53.767648 env[1210]: time="2025-09-09T00:33:53.767572032Z" level=error msg="StopPodSandbox for \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\" failed" error="failed to destroy network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 9 00:33:53.769511 kubelet[1447]: E0909 00:33:53.769455 1447 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Sep 9 00:33:53.769611 kubelet[1447]: E0909 00:33:53.769521 1447 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387"} Sep 9 00:33:53.769611 kubelet[1447]: E0909 00:33:53.769556 1447 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"05160a75-b9ce-4d3d-b486-13987693f6f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 9 00:33:53.769611 kubelet[1447]: E0909 00:33:53.769577 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"05160a75-b9ce-4d3d-b486-13987693f6f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-qc44z" podUID="05160a75-b9ce-4d3d-b486-13987693f6f1" Sep 9 00:33:54.475651 kubelet[1447]: E0909 00:33:54.475600 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:54.931540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1879510601.mount: Deactivated successfully. Sep 9 00:33:55.169026 env[1210]: time="2025-09-09T00:33:55.168959808Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:55.170854 env[1210]: time="2025-09-09T00:33:55.170816178Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:55.173045 env[1210]: time="2025-09-09T00:33:55.173010877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:55.174605 env[1210]: time="2025-09-09T00:33:55.174570779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:33:55.174979 env[1210]: time="2025-09-09T00:33:55.174949528Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 9 00:33:55.187313 env[1210]: time="2025-09-09T00:33:55.186920885Z" level=info msg="CreateContainer within sandbox \"0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 9 00:33:55.201561 env[1210]: time="2025-09-09T00:33:55.201512394Z" level=info msg="CreateContainer within sandbox \"0897c02f8cac28be36dfa7b7ef2e1c0af454967eb3f4f1a691c0ab7d1a4558ca\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a7b43857b9fd7949917fbb5aa077498939a84a0384117cf3ec920d3d9473c9ce\"" Sep 9 00:33:55.202567 env[1210]: time="2025-09-09T00:33:55.202534386Z" level=info msg="StartContainer for \"a7b43857b9fd7949917fbb5aa077498939a84a0384117cf3ec920d3d9473c9ce\"" Sep 9 00:33:55.218534 systemd[1]: Started cri-containerd-a7b43857b9fd7949917fbb5aa077498939a84a0384117cf3ec920d3d9473c9ce.scope. Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1541 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:55.246530 kernel: audit: type=1400 audit(1757378035.239:520): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.246619 kernel: audit: type=1300 audit(1757378035.239:520): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1541 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:55.246666 kernel: audit: type=1327 audit(1757378035.239:520): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623433383537623966643739343939313766626235616130373734 Sep 9 00:33:55.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623433383537623966643739343939313766626235616130373734 Sep 9 00:33:55.249766 kernel: audit: type=1400 audit(1757378035.239:521): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.252262 kernel: audit: type=1400 audit(1757378035.239:521): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.256937 kernel: audit: type=1400 audit(1757378035.239:521): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.259749 kernel: audit: type=1400 audit(1757378035.239:521): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.259862 kernel: audit: type=1400 audit(1757378035.239:521): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.264751 kernel: audit: type=1400 audit(1757378035.239:521): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.264860 kernel: audit: type=1400 audit(1757378035.239:521): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.239000 audit: BPF prog-id=72 op=LOAD Sep 9 00:33:55.239000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1541 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:55.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623433383537623966643739343939313766626235616130373734 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.241000 audit: BPF prog-id=73 op=LOAD Sep 9 00:33:55.241000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1541 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:55.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623433383537623966643739343939313766626235616130373734 Sep 9 00:33:55.245000 audit: BPF prog-id=73 op=UNLOAD Sep 9 00:33:55.245000 audit: BPF prog-id=72 op=UNLOAD Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:55.245000 audit: BPF prog-id=74 op=LOAD Sep 9 00:33:55.245000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1541 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:55.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623433383537623966643739343939313766626235616130373734 Sep 9 00:33:55.272782 env[1210]: time="2025-09-09T00:33:55.272726706Z" level=info msg="StartContainer for \"a7b43857b9fd7949917fbb5aa077498939a84a0384117cf3ec920d3d9473c9ce\" returns successfully" Sep 9 00:33:55.395467 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 9 00:33:55.395596 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 9 00:33:55.476626 kubelet[1447]: E0909 00:33:55.476520 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:56.476909 kubelet[1447]: E0909 00:33:56.476857 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:56.664000 audit[2147]: AVC avc: denied { write } for pid=2147 comm="tee" name="fd" dev="proc" ino=15505 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:33:56.664000 audit[2147]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcae067d9 a2=241 a3=1b6 items=1 ppid=2120 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.664000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 9 00:33:56.664000 audit: PATH item=0 name="/dev/fd/63" inode=15502 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:56.664000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:33:56.667000 audit[2157]: AVC avc: denied { write } for pid=2157 comm="tee" name="fd" dev="proc" ino=15514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:33:56.667000 audit[2157]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1ce67eb a2=241 a3=1b6 items=1 ppid=2116 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.667000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 9 00:33:56.667000 audit: PATH item=0 name="/dev/fd/63" inode=15508 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:56.667000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:33:56.680000 audit[2177]: AVC avc: denied { write } for pid=2177 comm="tee" name="fd" dev="proc" ino=13957 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:33:56.680000 audit[2177]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6f357e9 a2=241 a3=1b6 items=1 ppid=2123 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.680000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 9 00:33:56.680000 audit: PATH item=0 name="/dev/fd/63" inode=13954 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:56.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:33:56.681000 audit[2180]: AVC avc: denied { write } for pid=2180 comm="tee" name="fd" dev="proc" ino=14666 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:33:56.681000 audit[2180]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9b437ea a2=241 a3=1b6 items=1 ppid=2127 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.681000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 9 00:33:56.681000 audit: PATH item=0 name="/dev/fd/63" inode=14663 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:56.681000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:33:56.692000 audit[2170]: AVC avc: denied { write } for pid=2170 comm="tee" name="fd" dev="proc" ino=14674 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:33:56.692000 audit[2170]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd56a27da a2=241 a3=1b6 items=1 ppid=2115 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.692000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 9 00:33:56.692000 audit: PATH item=0 name="/dev/fd/63" inode=14662 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:56.692000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:33:56.697000 audit[2189]: AVC avc: denied { write } for pid=2189 comm="tee" name="fd" dev="proc" ino=14678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:33:56.697000 audit[2189]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb3a47e9 a2=241 a3=1b6 items=1 ppid=2125 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.697000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 9 00:33:56.697000 audit: PATH item=0 name="/dev/fd/63" inode=13276 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:56.697000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:33:56.699000 audit[2187]: AVC avc: denied { write } for pid=2187 comm="tee" name="fd" dev="proc" ino=13281 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 9 00:33:56.699000 audit[2187]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe440c7e9 a2=241 a3=1b6 items=1 ppid=2119 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.699000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 9 00:33:56.699000 audit: PATH item=0 name="/dev/fd/63" inode=13275 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:33:56.699000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 9 00:33:56.752089 systemd[1]: run-containerd-runc-k8s.io-a7b43857b9fd7949917fbb5aa077498939a84a0384117cf3ec920d3d9473c9ce-runc.RovEDo.mount: Deactivated successfully. Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit: BPF prog-id=75 op=LOAD Sep 9 00:33:56.837000 audit[2251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdace9f28 a2=98 a3=ffffdace9f18 items=0 ppid=2128 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.837000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:33:56.837000 audit: BPF prog-id=75 op=UNLOAD Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit: BPF prog-id=76 op=LOAD Sep 9 00:33:56.837000 audit[2251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdace9dd8 a2=74 a3=95 items=0 ppid=2128 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.837000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:33:56.837000 audit: BPF prog-id=76 op=UNLOAD Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit: BPF prog-id=77 op=LOAD Sep 9 00:33:56.837000 audit[2251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdace9e08 a2=40 a3=ffffdace9e38 items=0 ppid=2128 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.837000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:33:56.837000 audit: BPF prog-id=77 op=UNLOAD Sep 9 00:33:56.837000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.837000 audit[2251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffdace9f20 a2=50 a3=0 items=0 ppid=2128 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.837000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit: BPF prog-id=78 op=LOAD Sep 9 00:33:56.838000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc43ae2e8 a2=98 a3=ffffc43ae2d8 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.838000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.838000 audit: BPF prog-id=78 op=UNLOAD Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.838000 audit: BPF prog-id=79 op=LOAD Sep 9 00:33:56.838000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc43adf78 a2=74 a3=95 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.838000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.839000 audit: BPF prog-id=79 op=UNLOAD Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.839000 audit: BPF prog-id=80 op=LOAD Sep 9 00:33:56.839000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc43adfd8 a2=94 a3=2 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.839000 audit: BPF prog-id=80 op=UNLOAD Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit: BPF prog-id=81 op=LOAD Sep 9 00:33:56.923000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc43adf98 a2=40 a3=ffffc43adfc8 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.923000 audit: BPF prog-id=81 op=UNLOAD Sep 9 00:33:56.923000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.923000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc43ae0b0 a2=50 a3=0 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.932000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.932000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc43ae008 a2=28 a3=ffffc43ae138 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.932000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.932000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.932000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc43ae038 a2=28 a3=ffffc43ae168 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.932000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.933000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.933000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc43adee8 a2=28 a3=ffffc43ae018 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.933000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.933000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.933000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc43ae058 a2=28 a3=ffffc43ae188 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.933000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.933000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.933000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc43ae038 a2=28 a3=ffffc43ae168 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.933000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.933000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.933000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc43ae028 a2=28 a3=ffffc43ae158 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.933000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.933000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.933000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc43ae058 a2=28 a3=ffffc43ae188 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.933000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.933000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.933000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc43ae038 a2=28 a3=ffffc43ae168 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.933000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.933000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.933000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc43ae058 a2=28 a3=ffffc43ae188 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.933000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc43ae028 a2=28 a3=ffffc43ae158 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.934000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc43ae0a8 a2=28 a3=ffffc43ae1e8 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.934000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc43adde0 a2=50 a3=0 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.934000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.934000 audit: BPF prog-id=82 op=LOAD Sep 9 00:33:56.934000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc43adde8 a2=94 a3=5 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.934000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.935000 audit: BPF prog-id=82 op=UNLOAD Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc43adef0 a2=50 a3=0 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc43ae038 a2=4 a3=3 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.935000 audit[2252]: AVC avc: denied { confidentiality } for pid=2252 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:33:56.935000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc43ae018 a2=94 a3=6 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.936000 audit[2252]: AVC avc: denied { confidentiality } for pid=2252 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:33:56.936000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc43ad7e8 a2=94 a3=83 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.936000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.937000 audit[2252]: AVC avc: denied { confidentiality } for pid=2252 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:33:56.937000 audit[2252]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc43ad7e8 a2=94 a3=83 items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.937000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit: BPF prog-id=83 op=LOAD Sep 9 00:33:56.947000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd422988 a2=98 a3=ffffdd422978 items=0 ppid=2128 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.947000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 9 00:33:56.947000 audit: BPF prog-id=83 op=UNLOAD Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit: BPF prog-id=84 op=LOAD Sep 9 00:33:56.947000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd422838 a2=74 a3=95 items=0 ppid=2128 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.947000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 9 00:33:56.947000 audit: BPF prog-id=84 op=UNLOAD Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:56.947000 audit: BPF prog-id=85 op=LOAD Sep 9 00:33:56.947000 audit[2255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd422868 a2=40 a3=ffffdd422898 items=0 ppid=2128 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:56.947000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 9 00:33:56.947000 audit: BPF prog-id=85 op=UNLOAD Sep 9 00:33:57.006971 systemd-networkd[1038]: vxlan.calico: Link UP Sep 9 00:33:57.006978 systemd-networkd[1038]: vxlan.calico: Gained carrier Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit: BPF prog-id=86 op=LOAD Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd470aa8 a2=98 a3=ffffdd470a98 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit: BPF prog-id=86 op=UNLOAD Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit: BPF prog-id=87 op=LOAD Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd470788 a2=74 a3=95 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit: BPF prog-id=87 op=UNLOAD Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit: BPF prog-id=88 op=LOAD Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd4707e8 a2=94 a3=2 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit: BPF prog-id=88 op=UNLOAD Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd470818 a2=28 a3=ffffdd470948 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd470848 a2=28 a3=ffffdd470978 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd4706f8 a2=28 a3=ffffdd470828 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd470868 a2=28 a3=ffffdd470998 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd470848 a2=28 a3=ffffdd470978 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd470838 a2=28 a3=ffffdd470968 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd470868 a2=28 a3=ffffdd470998 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd470848 a2=28 a3=ffffdd470978 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.023000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.023000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd470868 a2=28 a3=ffffdd470998 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.023000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd470838 a2=28 a3=ffffdd470968 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd4708b8 a2=28 a3=ffffdd4709f8 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit: BPF prog-id=89 op=LOAD Sep 9 00:33:57.024000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd4706d8 a2=40 a3=ffffdd470708 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.024000 audit: BPF prog-id=89 op=UNLOAD Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdd470700 a2=50 a3=0 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdd470700 a2=50 a3=0 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit: BPF prog-id=90 op=LOAD Sep 9 00:33:57.024000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd46fe68 a2=94 a3=2 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.024000 audit: BPF prog-id=90 op=UNLOAD Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.024000 audit: BPF prog-id=91 op=LOAD Sep 9 00:33:57.024000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd46fff8 a2=94 a3=30 items=0 ppid=2128 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.024000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit: BPF prog-id=92 op=LOAD Sep 9 00:33:57.029000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc41d3378 a2=98 a3=ffffc41d3368 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.029000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.029000 audit: BPF prog-id=92 op=UNLOAD Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit: BPF prog-id=93 op=LOAD Sep 9 00:33:57.029000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc41d3008 a2=74 a3=95 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.029000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.029000 audit: BPF prog-id=93 op=UNLOAD Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.029000 audit: BPF prog-id=94 op=LOAD Sep 9 00:33:57.029000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc41d3068 a2=94 a3=2 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.029000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.029000 audit: BPF prog-id=94 op=UNLOAD Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.117000 audit: BPF prog-id=95 op=LOAD Sep 9 00:33:57.117000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc41d3028 a2=40 a3=ffffc41d3058 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.117000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.118000 audit: BPF prog-id=95 op=UNLOAD Sep 9 00:33:57.118000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.118000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc41d3140 a2=50 a3=0 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.118000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc41d3098 a2=28 a3=ffffc41d31c8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc41d30c8 a2=28 a3=ffffc41d31f8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc41d2f78 a2=28 a3=ffffc41d30a8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc41d30e8 a2=28 a3=ffffc41d3218 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc41d30c8 a2=28 a3=ffffc41d31f8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc41d30b8 a2=28 a3=ffffc41d31e8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc41d30e8 a2=28 a3=ffffc41d3218 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc41d30c8 a2=28 a3=ffffc41d31f8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc41d30e8 a2=28 a3=ffffc41d3218 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc41d30b8 a2=28 a3=ffffc41d31e8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc41d3138 a2=28 a3=ffffc41d3278 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc41d2e70 a2=50 a3=0 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.126000 audit: BPF prog-id=96 op=LOAD Sep 9 00:33:57.126000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc41d2e78 a2=94 a3=5 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit: BPF prog-id=96 op=UNLOAD Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc41d2f80 a2=50 a3=0 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc41d30c8 a2=4 a3=3 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { confidentiality } for pid=2285 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc41d30a8 a2=94 a3=6 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { confidentiality } for pid=2285 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc41d2878 a2=94 a3=83 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { confidentiality } for pid=2285 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc41d2878 a2=94 a3=83 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc41d42b8 a2=10 a3=ffffc41d43a8 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc41d4178 a2=10 a3=ffffc41d4268 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc41d40e8 a2=10 a3=ffffc41d4268 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.127000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:33:57.127000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc41d40e8 a2=10 a3=ffffc41d4268 items=0 ppid=2128 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 9 00:33:57.137000 audit: BPF prog-id=91 op=UNLOAD Sep 9 00:33:57.177000 audit[2313]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:33:57.177000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcd2941e0 a2=0 a3=ffffa6f82fa8 items=0 ppid=2128 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.177000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:33:57.180000 audit[2312]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:33:57.180000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcbb036b0 a2=0 a3=ffffb86ebfa8 items=0 ppid=2128 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.180000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:33:57.183000 audit[2315]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:33:57.183000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc4fbd110 a2=0 a3=ffffa153efa8 items=0 ppid=2128 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.183000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:33:57.186000 audit[2311]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:33:57.186000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffda9c8a40 a2=0 a3=ffffb706ffa8 items=0 ppid=2128 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:33:57.186000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:33:57.477469 kubelet[1447]: E0909 00:33:57.477346 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:57.761095 systemd[1]: run-containerd-runc-k8s.io-a7b43857b9fd7949917fbb5aa077498939a84a0384117cf3ec920d3d9473c9ce-runc.2Rqlzb.mount: Deactivated successfully. Sep 9 00:33:58.478359 kubelet[1447]: E0909 00:33:58.478296 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:33:58.749710 systemd-networkd[1038]: vxlan.calico: Gained IPv6LL Sep 9 00:33:59.478852 kubelet[1447]: E0909 00:33:59.478815 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:00.458027 kubelet[1447]: E0909 00:34:00.456323 1447 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:00.479888 kubelet[1447]: E0909 00:34:00.479856 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:01.481169 kubelet[1447]: E0909 00:34:01.480964 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:02.481291 kubelet[1447]: E0909 00:34:02.481254 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:03.482369 kubelet[1447]: E0909 00:34:03.482297 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:04.482644 kubelet[1447]: E0909 00:34:04.482589 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:05.483407 kubelet[1447]: E0909 00:34:05.483326 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:05.684425 env[1210]: time="2025-09-09T00:34:05.684376327Z" level=info msg="StopPodSandbox for \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\"" Sep 9 00:34:05.738067 kubelet[1447]: I0909 00:34:05.737190 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-92rj9" podStartSLOduration=13.149492101 podStartE2EDuration="25.737168918s" podCreationTimestamp="2025-09-09 00:33:40 +0000 UTC" firstStartedPulling="2025-09-09 00:33:42.58824932 +0000 UTC m=+2.906283972" lastFinishedPulling="2025-09-09 00:33:55.175926097 +0000 UTC m=+15.493960789" observedRunningTime="2025-09-09 00:33:55.763885252 +0000 UTC m=+16.081919944" watchObservedRunningTime="2025-09-09 00:34:05.737168918 +0000 UTC m=+26.055203570" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.737 [INFO][2367] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.737 [INFO][2367] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" iface="eth0" netns="/var/run/netns/cni-8dc79792-f917-a6b5-333c-df504e817b84" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.737 [INFO][2367] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" iface="eth0" netns="/var/run/netns/cni-8dc79792-f917-a6b5-333c-df504e817b84" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.738 [INFO][2367] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" iface="eth0" netns="/var/run/netns/cni-8dc79792-f917-a6b5-333c-df504e817b84" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.738 [INFO][2367] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.738 [INFO][2367] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.774 [INFO][2376] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" HandleID="k8s-pod-network.3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Workload="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.774 [INFO][2376] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.774 [INFO][2376] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.787 [WARNING][2376] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" HandleID="k8s-pod-network.3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Workload="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.787 [INFO][2376] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" HandleID="k8s-pod-network.3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Workload="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.789 [INFO][2376] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:34:05.796671 env[1210]: 2025-09-09 00:34:05.795 [INFO][2367] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f" Sep 9 00:34:05.798330 env[1210]: time="2025-09-09T00:34:05.798262621Z" level=info msg="TearDown network for sandbox \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\" successfully" Sep 9 00:34:05.798330 env[1210]: time="2025-09-09T00:34:05.798311147Z" level=info msg="StopPodSandbox for \"3fe19595a6c0342c0cd75b30cea0acfbea64a1a4f6d53ce6d3cfcf51084a9e6f\" returns successfully" Sep 9 00:34:05.798849 systemd[1]: run-netns-cni\x2d8dc79792\x2df917\x2da6b5\x2d333c\x2ddf504e817b84.mount: Deactivated successfully. Sep 9 00:34:05.800340 env[1210]: time="2025-09-09T00:34:05.799067906Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvffn,Uid:4d11223a-0369-4cc9-aeb9-b1d2d8273939,Namespace:calico-system,Attempt:1,}" Sep 9 00:34:05.909284 systemd-networkd[1038]: calib6e38b07e35: Link UP Sep 9 00:34:05.910895 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:34:05.910954 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib6e38b07e35: link becomes ready Sep 9 00:34:05.910677 systemd-networkd[1038]: calib6e38b07e35: Gained carrier Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.845 [INFO][2384] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.76-k8s-csi--node--driver--qvffn-eth0 csi-node-driver- calico-system 4d11223a-0369-4cc9-aeb9-b1d2d8273939 1226 0 2025-09-09 00:33:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.76 csi-node-driver-qvffn eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib6e38b07e35 [] [] }} ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.845 [INFO][2384] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.869 [INFO][2400] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" HandleID="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Workload="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.869 [INFO][2400] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" HandleID="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Workload="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000512ba0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.76", "pod":"csi-node-driver-qvffn", "timestamp":"2025-09-09 00:34:05.869724816 +0000 UTC"}, Hostname:"10.0.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.869 [INFO][2400] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.869 [INFO][2400] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.870 [INFO][2400] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.76' Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.880 [INFO][2400] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.885 [INFO][2400] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.889 [INFO][2400] ipam/ipam.go 511: Trying affinity for 192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.891 [INFO][2400] ipam/ipam.go 158: Attempting to load block cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.894 [INFO][2400] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.894 [INFO][2400] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.80.128/26 handle="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.896 [INFO][2400] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.900 [INFO][2400] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.80.128/26 handle="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.905 [INFO][2400] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.80.129/26] block=192.168.80.128/26 handle="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.905 [INFO][2400] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.80.129/26] handle="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" host="10.0.0.76" Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.905 [INFO][2400] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:34:05.922750 env[1210]: 2025-09-09 00:34:05.905 [INFO][2400] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.80.129/26] IPv6=[] ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" HandleID="k8s-pod-network.63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Workload="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.923429 env[1210]: 2025-09-09 00:34:05.907 [INFO][2384] cni-plugin/k8s.go 418: Populated endpoint ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-csi--node--driver--qvffn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4d11223a-0369-4cc9-aeb9-b1d2d8273939", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"", Pod:"csi-node-driver-qvffn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.80.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib6e38b07e35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:05.923429 env[1210]: 2025-09-09 00:34:05.907 [INFO][2384] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.80.129/32] ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.923429 env[1210]: 2025-09-09 00:34:05.907 [INFO][2384] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib6e38b07e35 ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.923429 env[1210]: 2025-09-09 00:34:05.910 [INFO][2384] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.923429 env[1210]: 2025-09-09 00:34:05.912 [INFO][2384] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-csi--node--driver--qvffn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4d11223a-0369-4cc9-aeb9-b1d2d8273939", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a", Pod:"csi-node-driver-qvffn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.80.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib6e38b07e35", MAC:"ba:b1:f1:7c:0c:66", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:05.923429 env[1210]: 2025-09-09 00:34:05.921 [INFO][2384] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a" Namespace="calico-system" Pod="csi-node-driver-qvffn" WorkloadEndpoint="10.0.0.76-k8s-csi--node--driver--qvffn-eth0" Sep 9 00:34:05.932834 env[1210]: time="2025-09-09T00:34:05.932718439Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:34:05.932834 env[1210]: time="2025-09-09T00:34:05.932783166Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:34:05.932834 env[1210]: time="2025-09-09T00:34:05.932794447Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:34:05.933190 env[1210]: time="2025-09-09T00:34:05.933147844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a pid=2426 runtime=io.containerd.runc.v2 Sep 9 00:34:05.949703 systemd[1]: Started cri-containerd-63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a.scope. Sep 9 00:34:05.935000 audit[2423]: NETFILTER_CFG table=filter:71 family=2 entries=38 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:34:05.954529 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 9 00:34:05.954583 kernel: audit: type=1325 audit(1757378045.935:635): table=filter:71 family=2 entries=38 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:34:05.954611 kernel: audit: type=1300 audit(1757378045.935:635): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffdd9b8630 a2=0 a3=ffff86036fa8 items=0 ppid=2128 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:05.935000 audit[2423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffdd9b8630 a2=0 a3=ffff86036fa8 items=0 ppid=2128 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:05.957664 kernel: audit: type=1327 audit(1757378045.935:635): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:34:05.935000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968838 kernel: audit: type=1400 audit(1757378045.964:636): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968954 kernel: audit: type=1400 audit(1757378045.964:637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.971383 kernel: audit: type=1400 audit(1757378045.964:638): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.971438 kernel: audit: type=1400 audit(1757378045.964:639): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.973568 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:34:05.975405 kernel: audit: type=1400 audit(1757378045.964:640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.975450 kernel: audit: type=1400 audit(1757378045.964:641): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.979461 kernel: audit: type=1400 audit(1757378045.964:642): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.966000 audit: BPF prog-id=97 op=LOAD Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:05.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373231653065613134373639393231383064356562356239373038 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:05.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373231653065613134373639393231383064356562356239373038 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit: BPF prog-id=98 op=LOAD Sep 9 00:34:05.968000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:05.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373231653065613134373639393231383064356562356239373038 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit: BPF prog-id=99 op=LOAD Sep 9 00:34:05.968000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:05.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373231653065613134373639393231383064356562356239373038 Sep 9 00:34:05.968000 audit: BPF prog-id=99 op=UNLOAD Sep 9 00:34:05.968000 audit: BPF prog-id=98 op=UNLOAD Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:05.968000 audit: BPF prog-id=100 op=LOAD Sep 9 00:34:05.968000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:05.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373231653065613134373639393231383064356562356239373038 Sep 9 00:34:05.992290 env[1210]: time="2025-09-09T00:34:05.989017279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvffn,Uid:4d11223a-0369-4cc9-aeb9-b1d2d8273939,Namespace:calico-system,Attempt:1,} returns sandbox id \"63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a\"" Sep 9 00:34:05.992470 env[1210]: time="2025-09-09T00:34:05.992433038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 9 00:34:06.484338 kubelet[1447]: E0909 00:34:06.483958 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:06.911739 env[1210]: time="2025-09-09T00:34:06.911410508Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:06.913136 env[1210]: time="2025-09-09T00:34:06.913085834Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:06.919519 env[1210]: time="2025-09-09T00:34:06.919477869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:06.921342 env[1210]: time="2025-09-09T00:34:06.921300970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:06.921682 env[1210]: time="2025-09-09T00:34:06.921649085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 9 00:34:06.924363 env[1210]: time="2025-09-09T00:34:06.924323470Z" level=info msg="CreateContainer within sandbox \"63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 9 00:34:06.939135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount689748098.mount: Deactivated successfully. Sep 9 00:34:06.939406 env[1210]: time="2025-09-09T00:34:06.939163304Z" level=info msg="CreateContainer within sandbox \"63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"15987641c0f997ed46d400b5c2d6472818c14e59e5d1d593ae48b05ac84e37ee\"" Sep 9 00:34:06.940052 env[1210]: time="2025-09-09T00:34:06.939853493Z" level=info msg="StartContainer for \"15987641c0f997ed46d400b5c2d6472818c14e59e5d1d593ae48b05ac84e37ee\"" Sep 9 00:34:06.957615 systemd[1]: Started cri-containerd-15987641c0f997ed46d400b5c2d6472818c14e59e5d1d593ae48b05ac84e37ee.scope. Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2426 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:06.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393837363431633066393937656434366434303062356332643634 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.977000 audit: BPF prog-id=101 op=LOAD Sep 9 00:34:06.977000 audit[2473]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2426 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:06.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393837363431633066393937656434366434303062356332643634 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit: BPF prog-id=102 op=LOAD Sep 9 00:34:06.978000 audit[2473]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2426 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:06.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393837363431633066393937656434366434303062356332643634 Sep 9 00:34:06.978000 audit: BPF prog-id=102 op=UNLOAD Sep 9 00:34:06.978000 audit: BPF prog-id=101 op=UNLOAD Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:06.978000 audit: BPF prog-id=103 op=LOAD Sep 9 00:34:06.978000 audit[2473]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2426 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:06.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135393837363431633066393937656434366434303062356332643634 Sep 9 00:34:06.994128 env[1210]: time="2025-09-09T00:34:06.994070237Z" level=info msg="StartContainer for \"15987641c0f997ed46d400b5c2d6472818c14e59e5d1d593ae48b05ac84e37ee\" returns successfully" Sep 9 00:34:06.995270 env[1210]: time="2025-09-09T00:34:06.995220711Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 9 00:34:07.484394 kubelet[1447]: E0909 00:34:07.484310 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:07.800286 systemd[1]: run-containerd-runc-k8s.io-15987641c0f997ed46d400b5c2d6472818c14e59e5d1d593ae48b05ac84e37ee-runc.TmdjOO.mount: Deactivated successfully. Sep 9 00:34:07.900990 systemd-networkd[1038]: calib6e38b07e35: Gained IPv6LL Sep 9 00:34:08.085337 env[1210]: time="2025-09-09T00:34:08.085228985Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:08.087922 env[1210]: time="2025-09-09T00:34:08.087883500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:08.089307 env[1210]: time="2025-09-09T00:34:08.089272983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:08.090850 env[1210]: time="2025-09-09T00:34:08.090821561Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:08.091282 env[1210]: time="2025-09-09T00:34:08.091253159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 9 00:34:08.094447 env[1210]: time="2025-09-09T00:34:08.094404438Z" level=info msg="CreateContainer within sandbox \"63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 9 00:34:08.109366 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount668538931.mount: Deactivated successfully. Sep 9 00:34:08.123033 env[1210]: time="2025-09-09T00:34:08.122975693Z" level=info msg="CreateContainer within sandbox \"63721e0ea1476992180d5eb5b9708e5450b368175b51ae89412d55f25646911a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"cbbf7c790656b82a44002b7c34e32cb4bfa0eccd70e42b642e573e1fb5bccdc6\"" Sep 9 00:34:08.127353 env[1210]: time="2025-09-09T00:34:08.127314918Z" level=info msg="StartContainer for \"cbbf7c790656b82a44002b7c34e32cb4bfa0eccd70e42b642e573e1fb5bccdc6\"" Sep 9 00:34:08.149347 systemd[1]: Started cri-containerd-cbbf7c790656b82a44002b7c34e32cb4bfa0eccd70e42b642e573e1fb5bccdc6.scope. Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2426 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:08.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626637633739303635366238326134343030326237633334653332 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.169000 audit: BPF prog-id=104 op=LOAD Sep 9 00:34:08.169000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2426 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:08.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626637633739303635366238326134343030326237633334653332 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit: BPF prog-id=105 op=LOAD Sep 9 00:34:08.170000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2426 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:08.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626637633739303635366238326134343030326237633334653332 Sep 9 00:34:08.170000 audit: BPF prog-id=105 op=UNLOAD Sep 9 00:34:08.170000 audit: BPF prog-id=104 op=UNLOAD Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:08.170000 audit: BPF prog-id=106 op=LOAD Sep 9 00:34:08.170000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2426 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:08.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362626637633739303635366238326134343030326237633334653332 Sep 9 00:34:08.185249 env[1210]: time="2025-09-09T00:34:08.185168729Z" level=info msg="StartContainer for \"cbbf7c790656b82a44002b7c34e32cb4bfa0eccd70e42b642e573e1fb5bccdc6\" returns successfully" Sep 9 00:34:08.485326 kubelet[1447]: E0909 00:34:08.485207 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:08.650583 kubelet[1447]: I0909 00:34:08.650399 1447 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 9 00:34:08.650583 kubelet[1447]: I0909 00:34:08.650428 1447 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 9 00:34:08.684865 env[1210]: time="2025-09-09T00:34:08.684824127Z" level=info msg="StopPodSandbox for \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\"" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.760 [INFO][2557] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.760 [INFO][2557] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" iface="eth0" netns="/var/run/netns/cni-3d287d2c-ed5a-89f8-1cbb-4b5d7e49384e" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.760 [INFO][2557] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" iface="eth0" netns="/var/run/netns/cni-3d287d2c-ed5a-89f8-1cbb-4b5d7e49384e" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.761 [INFO][2557] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" iface="eth0" netns="/var/run/netns/cni-3d287d2c-ed5a-89f8-1cbb-4b5d7e49384e" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.761 [INFO][2557] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.761 [INFO][2557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.779 [INFO][2566] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" HandleID="k8s-pod-network.bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Workload="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.779 [INFO][2566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.780 [INFO][2566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.789 [WARNING][2566] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" HandleID="k8s-pod-network.bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Workload="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.789 [INFO][2566] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" HandleID="k8s-pod-network.bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Workload="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.791 [INFO][2566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:34:08.793890 env[1210]: 2025-09-09 00:34:08.792 [INFO][2557] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387" Sep 9 00:34:08.794836 env[1210]: time="2025-09-09T00:34:08.794798042Z" level=info msg="TearDown network for sandbox \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\" successfully" Sep 9 00:34:08.794915 env[1210]: time="2025-09-09T00:34:08.794898410Z" level=info msg="StopPodSandbox for \"bb4b11a136016a47b7d53af689e3812d4f5dcaa83d928dfca400cce9ee3d2387\" returns successfully" Sep 9 00:34:08.795623 env[1210]: time="2025-09-09T00:34:08.795592592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qc44z,Uid:05160a75-b9ce-4d3d-b486-13987693f6f1,Namespace:default,Attempt:1,}" Sep 9 00:34:08.798694 systemd[1]: run-netns-cni\x2d3d287d2c\x2ded5a\x2d89f8\x2d1cbb\x2d4b5d7e49384e.mount: Deactivated successfully. Sep 9 00:34:09.001211 systemd-networkd[1038]: cali59ac5dd37a0: Link UP Sep 9 00:34:09.003133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:34:09.003220 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali59ac5dd37a0: link becomes ready Sep 9 00:34:09.003315 systemd-networkd[1038]: cali59ac5dd37a0: Gained carrier Sep 9 00:34:09.031784 kubelet[1447]: I0909 00:34:09.031699 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-qvffn" podStartSLOduration=26.931301439 podStartE2EDuration="29.031678704s" podCreationTimestamp="2025-09-09 00:33:40 +0000 UTC" firstStartedPulling="2025-09-09 00:34:05.992052558 +0000 UTC m=+26.310087250" lastFinishedPulling="2025-09-09 00:34:08.092429823 +0000 UTC m=+28.410464515" observedRunningTime="2025-09-09 00:34:08.781194475 +0000 UTC m=+29.099229167" watchObservedRunningTime="2025-09-09 00:34:09.031678704 +0000 UTC m=+29.349713396" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.844 [INFO][2575] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0 nginx-deployment-8587fbcb89- default 05160a75-b9ce-4d3d-b486-13987693f6f1 1246 0 2025-09-09 00:33:52 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.76 nginx-deployment-8587fbcb89-qc44z eth0 default [] [] [kns.default ksa.default.default] cali59ac5dd37a0 [] [] }} ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.844 [INFO][2575] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.872 [INFO][2588] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" HandleID="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Workload="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.872 [INFO][2588] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" HandleID="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Workload="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001376b0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.76", "pod":"nginx-deployment-8587fbcb89-qc44z", "timestamp":"2025-09-09 00:34:08.872094818 +0000 UTC"}, Hostname:"10.0.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.872 [INFO][2588] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.872 [INFO][2588] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.872 [INFO][2588] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.76' Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.884 [INFO][2588] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.889 [INFO][2588] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.895 [INFO][2588] ipam/ipam.go 511: Trying affinity for 192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.898 [INFO][2588] ipam/ipam.go 158: Attempting to load block cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.903 [INFO][2588] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.903 [INFO][2588] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.80.128/26 handle="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.906 [INFO][2588] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0 Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.917 [INFO][2588] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.80.128/26 handle="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.996 [INFO][2588] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.80.130/26] block=192.168.80.128/26 handle="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.997 [INFO][2588] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.80.130/26] handle="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" host="10.0.0.76" Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.997 [INFO][2588] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:34:09.037998 env[1210]: 2025-09-09 00:34:08.997 [INFO][2588] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.80.130/26] IPv6=[] ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" HandleID="k8s-pod-network.51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Workload="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:09.038970 env[1210]: 2025-09-09 00:34:08.998 [INFO][2575] cni-plugin/k8s.go 418: Populated endpoint ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"05160a75-b9ce-4d3d-b486-13987693f6f1", ResourceVersion:"1246", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 33, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-qc44z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.80.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali59ac5dd37a0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:09.038970 env[1210]: 2025-09-09 00:34:08.999 [INFO][2575] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.80.130/32] ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:09.038970 env[1210]: 2025-09-09 00:34:08.999 [INFO][2575] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali59ac5dd37a0 ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:09.038970 env[1210]: 2025-09-09 00:34:09.003 [INFO][2575] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:09.038970 env[1210]: 2025-09-09 00:34:09.004 [INFO][2575] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"05160a75-b9ce-4d3d-b486-13987693f6f1", ResourceVersion:"1246", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 33, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0", Pod:"nginx-deployment-8587fbcb89-qc44z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.80.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali59ac5dd37a0", MAC:"a2:ed:40:e7:ab:0b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:09.038970 env[1210]: 2025-09-09 00:34:09.031 [INFO][2575] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0" Namespace="default" Pod="nginx-deployment-8587fbcb89-qc44z" WorkloadEndpoint="10.0.0.76-k8s-nginx--deployment--8587fbcb89--qc44z-eth0" Sep 9 00:34:09.050000 audit[2608]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2608 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:34:09.050000 audit[2608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=fffff47fe030 a2=0 a3=ffffb7f69fa8 items=0 ppid=2128 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:09.050000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:34:09.061082 env[1210]: time="2025-09-09T00:34:09.058147044Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:34:09.061082 env[1210]: time="2025-09-09T00:34:09.058195048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:34:09.061082 env[1210]: time="2025-09-09T00:34:09.058205449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:34:09.061082 env[1210]: time="2025-09-09T00:34:09.058436308Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0 pid=2615 runtime=io.containerd.runc.v2 Sep 9 00:34:09.076163 systemd[1]: Started cri-containerd-51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0.scope. Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit: BPF prog-id=107 op=LOAD Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:09.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636234613632343265613630313165666235373164386535663766 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:09.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636234613632343265613630313165666235373164386535663766 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit: BPF prog-id=108 op=LOAD Sep 9 00:34:09.093000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:09.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636234613632343265613630313165666235373164386535663766 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit: BPF prog-id=109 op=LOAD Sep 9 00:34:09.093000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:09.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636234613632343265613630313165666235373164386535663766 Sep 9 00:34:09.093000 audit: BPF prog-id=109 op=UNLOAD Sep 9 00:34:09.093000 audit: BPF prog-id=108 op=UNLOAD Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:09.093000 audit: BPF prog-id=110 op=LOAD Sep 9 00:34:09.093000 audit[2627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2615 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:09.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636234613632343265613630313165666235373164386535663766 Sep 9 00:34:09.095151 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:34:09.114236 env[1210]: time="2025-09-09T00:34:09.114197186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-qc44z,Uid:05160a75-b9ce-4d3d-b486-13987693f6f1,Namespace:default,Attempt:1,} returns sandbox id \"51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0\"" Sep 9 00:34:09.116093 env[1210]: time="2025-09-09T00:34:09.116053381Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 9 00:34:09.486689 kubelet[1447]: E0909 00:34:09.485559 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:10.486031 kubelet[1447]: E0909 00:34:10.485988 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:10.722444 systemd-networkd[1038]: cali59ac5dd37a0: Gained IPv6LL Sep 9 00:34:11.085086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1080718105.mount: Deactivated successfully. Sep 9 00:34:11.486925 kubelet[1447]: E0909 00:34:11.486800 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:12.072888 systemd[1]: run-containerd-runc-k8s.io-a7b43857b9fd7949917fbb5aa077498939a84a0384117cf3ec920d3d9473c9ce-runc.ciTvpR.mount: Deactivated successfully. Sep 9 00:34:12.410466 env[1210]: time="2025-09-09T00:34:12.410354836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:12.412861 env[1210]: time="2025-09-09T00:34:12.412823412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:12.415004 env[1210]: time="2025-09-09T00:34:12.414968044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:12.417369 env[1210]: time="2025-09-09T00:34:12.417339773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:12.418075 env[1210]: time="2025-09-09T00:34:12.418043583Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 9 00:34:12.420358 env[1210]: time="2025-09-09T00:34:12.420321465Z" level=info msg="CreateContainer within sandbox \"51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 9 00:34:12.431870 env[1210]: time="2025-09-09T00:34:12.431820844Z" level=info msg="CreateContainer within sandbox \"51cb4a6242ea6011efb571d8e5f7fe4a659b297c01a6cce4676e94f84e1f59d0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"4c0dc02686117328b24193b1ec30bfab86691e35139401a94ef216f7666e9acd\"" Sep 9 00:34:12.432313 env[1210]: time="2025-09-09T00:34:12.432243834Z" level=info msg="StartContainer for \"4c0dc02686117328b24193b1ec30bfab86691e35139401a94ef216f7666e9acd\"" Sep 9 00:34:12.450351 systemd[1]: Started cri-containerd-4c0dc02686117328b24193b1ec30bfab86691e35139401a94ef216f7666e9acd.scope. Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.469844 kernel: kauditd_printk_skb: 196 callbacks suppressed Sep 9 00:34:12.469902 kernel: audit: type=1400 audit(1757378052.465:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.469926 kernel: audit: type=1400 audit(1757378052.465:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474121 kernel: audit: type=1400 audit(1757378052.465:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474189 kernel: audit: type=1400 audit(1757378052.465:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.478369 kernel: audit: type=1400 audit(1757378052.465:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.478437 kernel: audit: type=1400 audit(1757378052.465:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.482727 kernel: audit: type=1400 audit(1757378052.465:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.482818 kernel: audit: type=1400 audit(1757378052.465:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.487181 kernel: audit: type=1400 audit(1757378052.465:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.487258 kubelet[1447]: E0909 00:34:12.487129 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:12.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.489622 kernel: audit: type=1400 audit(1757378052.465:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.465000 audit: BPF prog-id=111 op=LOAD Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2615 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:12.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306463303236383631313733323862323431393362316563333062 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2615 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:12.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306463303236383631313733323862323431393362316563333062 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.470000 audit: BPF prog-id=112 op=LOAD Sep 9 00:34:12.470000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2615 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:12.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306463303236383631313733323862323431393362316563333062 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.472000 audit: BPF prog-id=113 op=LOAD Sep 9 00:34:12.472000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2615 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:12.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306463303236383631313733323862323431393362316563333062 Sep 9 00:34:12.474000 audit: BPF prog-id=113 op=UNLOAD Sep 9 00:34:12.474000 audit: BPF prog-id=112 op=UNLOAD Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:12.474000 audit: BPF prog-id=114 op=LOAD Sep 9 00:34:12.474000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2615 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:12.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306463303236383631313733323862323431393362316563333062 Sep 9 00:34:12.500831 env[1210]: time="2025-09-09T00:34:12.499992016Z" level=info msg="StartContainer for \"4c0dc02686117328b24193b1ec30bfab86691e35139401a94ef216f7666e9acd\" returns successfully" Sep 9 00:34:12.790270 kubelet[1447]: I0909 00:34:12.788314 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-qc44z" podStartSLOduration=17.485070284 podStartE2EDuration="20.788296457s" podCreationTimestamp="2025-09-09 00:33:52 +0000 UTC" firstStartedPulling="2025-09-09 00:34:09.115808361 +0000 UTC m=+29.433843053" lastFinishedPulling="2025-09-09 00:34:12.419034534 +0000 UTC m=+32.737069226" observedRunningTime="2025-09-09 00:34:12.788114684 +0000 UTC m=+33.106149376" watchObservedRunningTime="2025-09-09 00:34:12.788296457 +0000 UTC m=+33.106331149" Sep 9 00:34:13.488225 kubelet[1447]: E0909 00:34:13.488179 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:14.488714 kubelet[1447]: E0909 00:34:14.488666 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:15.489439 kubelet[1447]: E0909 00:34:15.489344 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:15.500000 audit[2732]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:34:15.500000 audit[2732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff9e03b40 a2=0 a3=1 items=0 ppid=1692 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:15.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:34:15.510000 audit[2732]: NETFILTER_CFG table=nat:74 family=2 entries=26 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:34:15.510000 audit[2732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=fffff9e03b40 a2=0 a3=1 items=0 ppid=1692 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:15.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:34:15.524000 audit[2734]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:34:15.524000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe42094f0 a2=0 a3=1 items=0 ppid=1692 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:15.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:34:15.532000 audit[2734]: NETFILTER_CFG table=nat:76 family=2 entries=26 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:34:15.532000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffe42094f0 a2=0 a3=1 items=0 ppid=1692 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:15.532000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:34:15.560687 systemd[1]: Created slice kubepods-besteffort-pod40a32234_84de_415e_bff0_9d37089392b7.slice. Sep 9 00:34:15.724736 kubelet[1447]: I0909 00:34:15.724654 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kclzf\" (UniqueName: \"kubernetes.io/projected/40a32234-84de-415e-bff0-9d37089392b7-kube-api-access-kclzf\") pod \"nfs-server-provisioner-0\" (UID: \"40a32234-84de-415e-bff0-9d37089392b7\") " pod="default/nfs-server-provisioner-0" Sep 9 00:34:15.724736 kubelet[1447]: I0909 00:34:15.724706 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/40a32234-84de-415e-bff0-9d37089392b7-data\") pod \"nfs-server-provisioner-0\" (UID: \"40a32234-84de-415e-bff0-9d37089392b7\") " pod="default/nfs-server-provisioner-0" Sep 9 00:34:15.863948 env[1210]: time="2025-09-09T00:34:15.863842174Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:40a32234-84de-415e-bff0-9d37089392b7,Namespace:default,Attempt:0,}" Sep 9 00:34:15.970348 systemd-networkd[1038]: cali60e51b789ff: Link UP Sep 9 00:34:15.972120 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:34:15.972192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 9 00:34:15.972813 systemd-networkd[1038]: cali60e51b789ff: Gained carrier Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.910 [INFO][2736] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.76-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 40a32234-84de-415e-bff0-9d37089392b7 1293 0 2025-09-09 00:34:15 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.76 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.910 [INFO][2736] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.931 [INFO][2753] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" HandleID="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Workload="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.931 [INFO][2753] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" HandleID="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Workload="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000582540), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.76", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-09 00:34:15.931623489 +0000 UTC"}, Hostname:"10.0.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.931 [INFO][2753] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.931 [INFO][2753] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.931 [INFO][2753] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.76' Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.940 [INFO][2753] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.945 [INFO][2753] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.950 [INFO][2753] ipam/ipam.go 511: Trying affinity for 192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.952 [INFO][2753] ipam/ipam.go 158: Attempting to load block cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.955 [INFO][2753] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.955 [INFO][2753] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.80.128/26 handle="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.956 [INFO][2753] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96 Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.960 [INFO][2753] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.80.128/26 handle="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.966 [INFO][2753] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.80.131/26] block=192.168.80.128/26 handle="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.966 [INFO][2753] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.80.131/26] handle="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" host="10.0.0.76" Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.966 [INFO][2753] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:34:15.987759 env[1210]: 2025-09-09 00:34:15.966 [INFO][2753] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.80.131/26] IPv6=[] ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" HandleID="k8s-pod-network.3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Workload="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:34:15.988589 env[1210]: 2025-09-09 00:34:15.968 [INFO][2736] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"40a32234-84de-415e-bff0-9d37089392b7", ResourceVersion:"1293", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 34, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.80.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:15.988589 env[1210]: 2025-09-09 00:34:15.968 [INFO][2736] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.80.131/32] ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:34:15.988589 env[1210]: 2025-09-09 00:34:15.968 [INFO][2736] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:34:15.988589 env[1210]: 2025-09-09 00:34:15.972 [INFO][2736] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:34:15.988750 env[1210]: 2025-09-09 00:34:15.973 [INFO][2736] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"40a32234-84de-415e-bff0-9d37089392b7", ResourceVersion:"1293", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 34, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.80.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ce:a3:6e:be:1c:69", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:15.988750 env[1210]: 2025-09-09 00:34:15.985 [INFO][2736] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.76-k8s-nfs--server--provisioner--0-eth0" Sep 9 00:34:15.996862 env[1210]: time="2025-09-09T00:34:15.996791205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:34:15.996862 env[1210]: time="2025-09-09T00:34:15.996831367Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:34:15.996862 env[1210]: time="2025-09-09T00:34:15.996842088Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:34:15.997222 env[1210]: time="2025-09-09T00:34:15.997183349Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96 pid=2778 runtime=io.containerd.runc.v2 Sep 9 00:34:15.996000 audit[2780]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:34:15.996000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffcb87f420 a2=0 a3=ffff92d6cfa8 items=0 ppid=2128 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:15.996000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:34:16.013936 systemd[1]: Started cri-containerd-3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96.scope. Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.030000 audit: BPF prog-id=115 op=LOAD Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2778 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:16.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323863633436643961343061306663656666303164663664366261 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2778 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:16.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323863633436643961343061306663656666303164663664366261 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit: BPF prog-id=116 op=LOAD Sep 9 00:34:16.031000 audit[2791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2778 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:16.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323863633436643961343061306663656666303164663664366261 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit: BPF prog-id=117 op=LOAD Sep 9 00:34:16.031000 audit[2791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2778 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:16.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323863633436643961343061306663656666303164663664366261 Sep 9 00:34:16.031000 audit: BPF prog-id=117 op=UNLOAD Sep 9 00:34:16.031000 audit: BPF prog-id=116 op=UNLOAD Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { perfmon } for pid=2791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit[2791]: AVC avc: denied { bpf } for pid=2791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:16.031000 audit: BPF prog-id=118 op=LOAD Sep 9 00:34:16.031000 audit[2791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2778 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:16.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323863633436643961343061306663656666303164663664366261 Sep 9 00:34:16.033048 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:34:16.055480 env[1210]: time="2025-09-09T00:34:16.055441918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:40a32234-84de-415e-bff0-9d37089392b7,Namespace:default,Attempt:0,} returns sandbox id \"3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96\"" Sep 9 00:34:16.057110 env[1210]: time="2025-09-09T00:34:16.057032969Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 9 00:34:16.489487 kubelet[1447]: E0909 00:34:16.489446 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:17.437047 systemd-networkd[1038]: cali60e51b789ff: Gained IPv6LL Sep 9 00:34:17.489902 kubelet[1447]: E0909 00:34:17.489857 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:17.968211 update_engine[1200]: I0909 00:34:17.967814 1200 update_attempter.cc:509] Updating boot flags... Sep 9 00:34:18.139860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3792448602.mount: Deactivated successfully. Sep 9 00:34:18.490953 kubelet[1447]: E0909 00:34:18.490911 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:19.491355 kubelet[1447]: E0909 00:34:19.491288 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:19.914204 env[1210]: time="2025-09-09T00:34:19.913896020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:19.916101 env[1210]: time="2025-09-09T00:34:19.916062728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:19.918298 env[1210]: time="2025-09-09T00:34:19.918271997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:19.920408 env[1210]: time="2025-09-09T00:34:19.920381302Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:19.921106 env[1210]: time="2025-09-09T00:34:19.921074496Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 9 00:34:19.923434 env[1210]: time="2025-09-09T00:34:19.923401691Z" level=info msg="CreateContainer within sandbox \"3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 9 00:34:19.935827 env[1210]: time="2025-09-09T00:34:19.935781025Z" level=info msg="CreateContainer within sandbox \"3c28cc46d9a40a0fceff01df6d6bac428d659cfdf8ba8250334d4c3863d95f96\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"3ca905ec9a563d491d99e369290953a71aec9da1a248912948418ff5ad3688ed\"" Sep 9 00:34:19.936262 env[1210]: time="2025-09-09T00:34:19.936237167Z" level=info msg="StartContainer for \"3ca905ec9a563d491d99e369290953a71aec9da1a248912948418ff5ad3688ed\"" Sep 9 00:34:19.952376 systemd[1]: Started cri-containerd-3ca905ec9a563d491d99e369290953a71aec9da1a248912948418ff5ad3688ed.scope. Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970863 kernel: kauditd_printk_skb: 119 callbacks suppressed Sep 9 00:34:19.970961 kernel: audit: type=1400 audit(1757378059.967:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970986 kernel: audit: type=1400 audit(1757378059.967:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.974985 kernel: audit: type=1400 audit(1757378059.967:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.975034 kernel: audit: type=1400 audit(1757378059.967:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.977310 kernel: audit: type=1400 audit(1757378059.967:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.981780 kernel: audit: type=1400 audit(1757378059.967:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.981857 kernel: audit: type=1400 audit(1757378059.967:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.985960 kernel: audit: type=1400 audit(1757378059.967:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.988057 kernel: audit: type=1400 audit(1757378059.967:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.990827 kernel: audit: type=1400 audit(1757378059.968:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit: BPF prog-id=119 op=LOAD Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2778 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:19.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613930356563396135363364343931643939653336393239303935 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2778 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:19.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613930356563396135363364343931643939653336393239303935 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.968000 audit: BPF prog-id=120 op=LOAD Sep 9 00:34:19.968000 audit[2840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2778 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:19.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613930356563396135363364343931643939653336393239303935 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.970000 audit: BPF prog-id=121 op=LOAD Sep 9 00:34:19.970000 audit[2840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2778 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:19.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613930356563396135363364343931643939653336393239303935 Sep 9 00:34:19.972000 audit: BPF prog-id=121 op=UNLOAD Sep 9 00:34:19.972000 audit: BPF prog-id=120 op=UNLOAD Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:19.972000 audit: BPF prog-id=122 op=LOAD Sep 9 00:34:19.972000 audit[2840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2778 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:19.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613930356563396135363364343931643939653336393239303935 Sep 9 00:34:20.000311 env[1210]: time="2025-09-09T00:34:20.000264500Z" level=info msg="StartContainer for \"3ca905ec9a563d491d99e369290953a71aec9da1a248912948418ff5ad3688ed\" returns successfully" Sep 9 00:34:20.054000 audit[2868]: AVC avc: denied { search } for pid=2868 comm="rpcbind" name="crypto" dev="proc" ino=15331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 9 00:34:20.054000 audit[2868]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9944f000 a2=0 a3=0 items=0 ppid=2850 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 key=(null) Sep 9 00:34:20.054000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 9 00:34:20.088000 audit[2873]: AVC avc: denied { search } for pid=2873 comm="dbus-daemon" name="crypto" dev="proc" ino=15331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 9 00:34:20.088000 audit[2873]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9751f000 a2=0 a3=0 items=0 ppid=2850 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 key=(null) Sep 9 00:34:20.088000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 9 00:34:20.092000 audit[2874]: AVC avc: denied { watch } for pid=2874 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c227,c759 tclass=dir permissive=0 Sep 9 00:34:20.092000 audit[2874]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaea540c20 a2=2c8 a3=aaaaea531a60 items=0 ppid=2850 pid=2874 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 key=(null) Sep 9 00:34:20.092000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 9 00:34:20.096000 audit[2875]: AVC avc: denied { read } for pid=2875 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18216 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 9 00:34:20.096000 audit[2875]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffbae0a570 a2=80000 a3=0 items=0 ppid=2850 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 key=(null) Sep 9 00:34:20.096000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 9 00:34:20.096000 audit[2875]: AVC avc: denied { search } for pid=2875 comm="ganesha.nfsd" name="crypto" dev="proc" ino=15331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 9 00:34:20.096000 audit[2875]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffba19f000 a2=0 a3=0 items=0 ppid=2850 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c227,c759 key=(null) Sep 9 00:34:20.096000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 9 00:34:20.457323 kubelet[1447]: E0909 00:34:20.457278 1447 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:20.491542 kubelet[1447]: E0909 00:34:20.491508 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:20.810710 kubelet[1447]: I0909 00:34:20.810539 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.945153859 podStartE2EDuration="5.810510013s" podCreationTimestamp="2025-09-09 00:34:15 +0000 UTC" firstStartedPulling="2025-09-09 00:34:16.056766114 +0000 UTC m=+36.374800806" lastFinishedPulling="2025-09-09 00:34:19.922122268 +0000 UTC m=+40.240156960" observedRunningTime="2025-09-09 00:34:20.810084433 +0000 UTC m=+41.128119125" watchObservedRunningTime="2025-09-09 00:34:20.810510013 +0000 UTC m=+41.128544705" Sep 9 00:34:20.822000 audit[2894]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:34:20.822000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffbc97cb0 a2=0 a3=1 items=0 ppid=1692 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:20.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:34:20.832000 audit[2894]: NETFILTER_CFG table=nat:79 family=2 entries=110 op=nft_register_chain pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 9 00:34:20.832000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=fffffbc97cb0 a2=0 a3=1 items=0 ppid=1692 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:20.832000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 9 00:34:21.492112 kubelet[1447]: E0909 00:34:21.492054 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:22.492852 kubelet[1447]: E0909 00:34:22.492804 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:23.493479 kubelet[1447]: E0909 00:34:23.493413 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:24.493743 kubelet[1447]: E0909 00:34:24.493688 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:25.494539 kubelet[1447]: E0909 00:34:25.494489 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:26.495407 kubelet[1447]: E0909 00:34:26.495370 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:27.496626 kubelet[1447]: E0909 00:34:27.496588 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:28.498048 kubelet[1447]: E0909 00:34:28.498010 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:29.419507 systemd[1]: Created slice kubepods-besteffort-podf5b6bc43_6c7e_405d_aa2f_3dadd4198203.slice. Sep 9 00:34:29.499292 kubelet[1447]: E0909 00:34:29.499255 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:29.510584 kubelet[1447]: I0909 00:34:29.510556 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-b634aee0-0aca-4534-bb28-cfcbd0b37ae0\" (UniqueName: \"kubernetes.io/nfs/f5b6bc43-6c7e-405d-aa2f-3dadd4198203-pvc-b634aee0-0aca-4534-bb28-cfcbd0b37ae0\") pod \"test-pod-1\" (UID: \"f5b6bc43-6c7e-405d-aa2f-3dadd4198203\") " pod="default/test-pod-1" Sep 9 00:34:29.510584 kubelet[1447]: I0909 00:34:29.510592 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8lsn7\" (UniqueName: \"kubernetes.io/projected/f5b6bc43-6c7e-405d-aa2f-3dadd4198203-kube-api-access-8lsn7\") pod \"test-pod-1\" (UID: \"f5b6bc43-6c7e-405d-aa2f-3dadd4198203\") " pod="default/test-pod-1" Sep 9 00:34:29.638010 kernel: Failed to create system directory netfs Sep 9 00:34:29.638150 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 9 00:34:29.638173 kernel: audit: type=1400 audit(1757378069.627:751): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.638197 kernel: Failed to create system directory netfs Sep 9 00:34:29.638213 kernel: audit: type=1400 audit(1757378069.627:751): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.638227 kernel: Failed to create system directory netfs Sep 9 00:34:29.638249 kernel: audit: type=1400 audit(1757378069.627:751): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.638276 kernel: Failed to create system directory netfs Sep 9 00:34:29.638292 kernel: audit: type=1400 audit(1757378069.627:751): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.627000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.627000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.627000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.627000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.627000 audit[2905]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf18295e0 a1=12c14 a2=aaaadf66e028 a3=aaaaf181a010 items=0 ppid=62 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:29.643639 kernel: audit: type=1300 audit(1757378069.627:751): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf18295e0 a1=12c14 a2=aaaadf66e028 a3=aaaaf181a010 items=0 ppid=62 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:29.643720 kernel: audit: type=1327 audit(1757378069.627:751): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:34:29.627000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.648273 kernel: Failed to create system directory fscache Sep 9 00:34:29.648353 kernel: audit: type=1400 audit(1757378069.639:752): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.648377 kernel: Failed to create system directory fscache Sep 9 00:34:29.648393 kernel: audit: type=1400 audit(1757378069.639:752): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.650869 kernel: Failed to create system directory fscache Sep 9 00:34:29.650930 kernel: audit: type=1400 audit(1757378069.639:752): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.653371 kernel: Failed to create system directory fscache Sep 9 00:34:29.653424 kernel: audit: type=1400 audit(1757378069.639:752): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.654330 kernel: Failed to create system directory fscache Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.656791 kernel: Failed to create system directory fscache Sep 9 00:34:29.656833 kernel: Failed to create system directory fscache Sep 9 00:34:29.657133 kernel: Failed to create system directory fscache Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.658020 kernel: Failed to create system directory fscache Sep 9 00:34:29.658072 kernel: Failed to create system directory fscache Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.658868 kernel: Failed to create system directory fscache Sep 9 00:34:29.658904 kernel: Failed to create system directory fscache Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.639000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.660193 kernel: Failed to create system directory fscache Sep 9 00:34:29.660230 kernel: Failed to create system directory fscache Sep 9 00:34:29.660905 kernel: FS-Cache: Loaded Sep 9 00:34:29.639000 audit[2905]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1a3c210 a1=4c344 a2=aaaadf66e028 a3=aaaaf181a010 items=0 ppid=62 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:29.639000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.684715 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.684803 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.684822 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.685166 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.686043 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.686070 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.686895 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.686932 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.688204 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.688241 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.688264 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.689110 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.689151 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.690010 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.690049 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.690858 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.690883 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.692204 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.692228 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.692253 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.693104 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.693126 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.693983 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.694018 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.694887 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.694924 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.696214 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.696244 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.696269 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.697108 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.697129 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.697989 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.698017 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.698897 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.698933 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.700240 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.700268 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.700288 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.701150 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.701171 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.702037 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.702053 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.702911 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.702935 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.703782 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.703826 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.705116 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.705134 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.705148 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.706006 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.706023 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.706876 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.706896 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.708208 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.708225 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.708243 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.709121 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.709170 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.710056 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.710086 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.710931 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.710953 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.711780 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.711796 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.713088 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.713103 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.713120 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.713974 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.714008 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.714833 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.714849 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.716156 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.716177 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.716238 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.717053 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.722243 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.722282 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.722304 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.722318 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.723147 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.723178 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.724035 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.724085 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.724899 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.724939 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.726244 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.726286 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.726305 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.727134 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.727156 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.728055 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.728097 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.728965 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.729007 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.730234 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.730253 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.730275 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.731137 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.731162 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.732031 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.732054 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.732900 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.732915 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.734274 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.734303 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.734317 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.735142 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.735166 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.736046 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.736061 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.736913 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.736930 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.738269 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.738309 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.738326 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.739148 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.739170 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.740032 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.740050 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.740922 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.740945 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.741787 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.741825 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.743093 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.743133 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.743147 kernel: Failed to create system directory sunrpc Sep 9 00:34:29.675000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.748845 kernel: RPC: Registered named UNIX socket transport module. Sep 9 00:34:29.748894 kernel: RPC: Registered udp transport module. Sep 9 00:34:29.748910 kernel: RPC: Registered tcp transport module. Sep 9 00:34:29.749786 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 9 00:34:29.675000 audit[2905]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1a88560 a1=14a74c a2=aaaadf66e028 a3=aaaaf181a010 items=6 ppid=62 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:29.675000 audit: CWD cwd="/" Sep 9 00:34:29.675000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:34:29.675000 audit: PATH item=1 name=(null) inode=18486 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:34:29.675000 audit: PATH item=2 name=(null) inode=18486 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:34:29.675000 audit: PATH item=3 name=(null) inode=18487 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:34:29.675000 audit: PATH item=4 name=(null) inode=18486 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:34:29.675000 audit: PATH item=5 name=(null) inode=18488 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 9 00:34:29.675000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.776070 kernel: Failed to create system directory nfs Sep 9 00:34:29.776106 kernel: Failed to create system directory nfs Sep 9 00:34:29.776122 kernel: Failed to create system directory nfs Sep 9 00:34:29.776135 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.776889 kernel: Failed to create system directory nfs Sep 9 00:34:29.776912 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.778159 kernel: Failed to create system directory nfs Sep 9 00:34:29.778206 kernel: Failed to create system directory nfs Sep 9 00:34:29.778221 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.779000 kernel: Failed to create system directory nfs Sep 9 00:34:29.779022 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.779812 kernel: Failed to create system directory nfs Sep 9 00:34:29.779828 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.781064 kernel: Failed to create system directory nfs Sep 9 00:34:29.781080 kernel: Failed to create system directory nfs Sep 9 00:34:29.781098 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.781897 kernel: Failed to create system directory nfs Sep 9 00:34:29.781912 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.783169 kernel: Failed to create system directory nfs Sep 9 00:34:29.783186 kernel: Failed to create system directory nfs Sep 9 00:34:29.783199 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.784008 kernel: Failed to create system directory nfs Sep 9 00:34:29.784032 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.784830 kernel: Failed to create system directory nfs Sep 9 00:34:29.784870 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.786086 kernel: Failed to create system directory nfs Sep 9 00:34:29.786103 kernel: Failed to create system directory nfs Sep 9 00:34:29.786122 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.786915 kernel: Failed to create system directory nfs Sep 9 00:34:29.786931 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.788182 kernel: Failed to create system directory nfs Sep 9 00:34:29.788209 kernel: Failed to create system directory nfs Sep 9 00:34:29.788223 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.789056 kernel: Failed to create system directory nfs Sep 9 00:34:29.789095 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.789887 kernel: Failed to create system directory nfs Sep 9 00:34:29.789913 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.791158 kernel: Failed to create system directory nfs Sep 9 00:34:29.791173 kernel: Failed to create system directory nfs Sep 9 00:34:29.791186 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.792009 kernel: Failed to create system directory nfs Sep 9 00:34:29.792030 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.792833 kernel: Failed to create system directory nfs Sep 9 00:34:29.792861 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.794108 kernel: Failed to create system directory nfs Sep 9 00:34:29.794153 kernel: Failed to create system directory nfs Sep 9 00:34:29.794168 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.794933 kernel: Failed to create system directory nfs Sep 9 00:34:29.794951 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.796201 kernel: Failed to create system directory nfs Sep 9 00:34:29.796227 kernel: Failed to create system directory nfs Sep 9 00:34:29.796241 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.797056 kernel: Failed to create system directory nfs Sep 9 00:34:29.797077 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.797886 kernel: Failed to create system directory nfs Sep 9 00:34:29.797905 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.799169 kernel: Failed to create system directory nfs Sep 9 00:34:29.799213 kernel: Failed to create system directory nfs Sep 9 00:34:29.799228 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.769000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.799997 kernel: Failed to create system directory nfs Sep 9 00:34:29.769000 audit[2905]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1c31a40 a1=11624c a2=aaaadf66e028 a3=aaaaf181a010 items=0 ppid=62 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:29.769000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 9 00:34:29.815924 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.843095 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.843136 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.843154 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.843981 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.844026 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.844830 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.844860 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.846110 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.846126 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.846139 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.846962 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.846979 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.847788 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.847856 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.849084 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.849148 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.849165 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.849988 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.850845 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.850874 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.850888 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.852167 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.852189 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.852203 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.853053 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.853942 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.853984 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.853998 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.854816 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.854835 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.856130 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.856156 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.856170 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.857012 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.857867 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.857891 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.857915 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.859230 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.859268 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.859286 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.860120 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.860142 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.860996 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.861852 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.861874 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.861890 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.863206 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.863237 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.863267 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.864106 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.864151 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.865000 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.865857 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.865873 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.865886 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.867169 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.867185 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.867198 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.868060 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.868092 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.868916 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.868943 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.869787 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.869816 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.871091 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.871108 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.871121 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.871967 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.871990 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.872822 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.872865 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.874157 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.874189 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.874202 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.875017 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.875862 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.875886 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.875899 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.877182 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.877215 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.877232 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.878103 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.878134 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.878986 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.879031 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.879867 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.879899 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.881175 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.881193 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.881206 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.882063 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.882936 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.882957 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.882974 kernel: Failed to create system directory nfs4 Sep 9 00:34:29.834000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.984799 kernel: NFS: Registering the id_resolver key type Sep 9 00:34:29.985113 kernel: Key type id_resolver registered Sep 9 00:34:29.985144 kernel: Key type id_legacy registered Sep 9 00:34:29.834000 audit[2910]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff804ca010 a1=19c6dc a2=aaaaddcfe028 a3=aaaafd900010 items=0 ppid=62 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:29.834000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.996978 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.997042 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.997062 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.998392 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.999136 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.999172 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.001183 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.001222 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.001237 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.002172 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.003664 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.003706 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.004302 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.006183 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.006226 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.006242 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.007873 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.007945 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.007962 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.009242 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.009299 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.009317 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.010246 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.010287 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:30.011226 kernel: Failed to create system directory rpcgss Sep 9 00:34:30.011270 kernel: Failed to create system directory rpcgss Sep 9 00:34:29.991000 audit[2911]: AVC avc: denied { confidentiality } for pid=2911 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 9 00:34:29.991000 audit[2911]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff904b2010 a1=5ee94 a2=aaaacd5ee028 a3=aaaaf1119010 items=0 ppid=62 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:29.991000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 9 00:34:30.027286 nfsidmap[2918]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 9 00:34:30.031194 nfsidmap[2921]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 9 00:34:30.049000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:34:30.049000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:34:30.049000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:34:30.049000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:34:30.049000 audit[1277]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadbaf8b50 a2=10 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.049000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 9 00:34:30.049000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:34:30.049000 audit[1277]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadbaf8b50 a2=10 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.049000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 9 00:34:30.049000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 9 00:34:30.049000 audit[1277]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadbaf8b50 a2=10 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.049000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 9 00:34:30.322855 env[1210]: time="2025-09-09T00:34:30.322681145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f5b6bc43-6c7e-405d-aa2f-3dadd4198203,Namespace:default,Attempt:0,}" Sep 9 00:34:30.440509 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 9 00:34:30.440661 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 9 00:34:30.438857 systemd-networkd[1038]: cali5ec59c6bf6e: Link UP Sep 9 00:34:30.440555 systemd-networkd[1038]: cali5ec59c6bf6e: Gained carrier Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.370 [INFO][2925] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.76-k8s-test--pod--1-eth0 default f5b6bc43-6c7e-405d-aa2f-3dadd4198203 1358 0 2025-09-09 00:34:15 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.76 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.371 [INFO][2925] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-eth0" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.398 [INFO][2939] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" HandleID="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Workload="10.0.0.76-k8s-test--pod--1-eth0" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.398 [INFO][2939] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" HandleID="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Workload="10.0.0.76-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001373a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.76", "pod":"test-pod-1", "timestamp":"2025-09-09 00:34:30.398698729 +0000 UTC"}, Hostname:"10.0.0.76", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.398 [INFO][2939] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.398 [INFO][2939] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.398 [INFO][2939] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.76' Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.408 [INFO][2939] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.413 [INFO][2939] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.417 [INFO][2939] ipam/ipam.go 511: Trying affinity for 192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.418 [INFO][2939] ipam/ipam.go 158: Attempting to load block cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.421 [INFO][2939] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.80.128/26 host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.421 [INFO][2939] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.80.128/26 handle="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.422 [INFO][2939] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.426 [INFO][2939] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.80.128/26 handle="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.432 [INFO][2939] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.80.132/26] block=192.168.80.128/26 handle="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.432 [INFO][2939] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.80.132/26] handle="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" host="10.0.0.76" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.432 [INFO][2939] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.432 [INFO][2939] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.80.132/26] IPv6=[] ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" HandleID="k8s-pod-network.944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Workload="10.0.0.76-k8s-test--pod--1-eth0" Sep 9 00:34:30.453190 env[1210]: 2025-09-09 00:34:30.434 [INFO][2925] cni-plugin/k8s.go 418: Populated endpoint ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f5b6bc43-6c7e-405d-aa2f-3dadd4198203", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 34, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.80.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:30.453872 env[1210]: 2025-09-09 00:34:30.434 [INFO][2925] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.80.132/32] ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-eth0" Sep 9 00:34:30.453872 env[1210]: 2025-09-09 00:34:30.434 [INFO][2925] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-eth0" Sep 9 00:34:30.453872 env[1210]: 2025-09-09 00:34:30.437 [INFO][2925] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-eth0" Sep 9 00:34:30.453872 env[1210]: 2025-09-09 00:34:30.440 [INFO][2925] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.76-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f5b6bc43-6c7e-405d-aa2f-3dadd4198203", ResourceVersion:"1358", Generation:0, CreationTimestamp:time.Date(2025, time.September, 9, 0, 34, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.76", ContainerID:"944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.80.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"3e:e0:c2:ff:16:24", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 9 00:34:30.453872 env[1210]: 2025-09-09 00:34:30.447 [INFO][2925] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.76-k8s-test--pod--1-eth0" Sep 9 00:34:30.469211 env[1210]: time="2025-09-09T00:34:30.469150263Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 9 00:34:30.469211 env[1210]: time="2025-09-09T00:34:30.469188265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 9 00:34:30.469211 env[1210]: time="2025-09-09T00:34:30.469199025Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 9 00:34:30.467000 audit[2962]: NETFILTER_CFG table=filter:80 family=2 entries=46 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 9 00:34:30.467000 audit[2962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23188 a0=3 a1=ffffcb39fda0 a2=0 a3=ffff8df54fa8 items=0 ppid=2128 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.467000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 9 00:34:30.469659 env[1210]: time="2025-09-09T00:34:30.469610797Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a pid=2963 runtime=io.containerd.runc.v2 Sep 9 00:34:30.483072 systemd[1]: Started cri-containerd-944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a.scope. Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit: BPF prog-id=123 op=LOAD Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934346432376535386166323061353030613632633231313935623838 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934346432376535386166323061353030613632633231313935623838 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.496000 audit: BPF prog-id=124 op=LOAD Sep 9 00:34:30.496000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934346432376535386166323061353030613632633231313935623838 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit: BPF prog-id=125 op=LOAD Sep 9 00:34:30.497000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934346432376535386166323061353030613632633231313935623838 Sep 9 00:34:30.497000 audit: BPF prog-id=125 op=UNLOAD Sep 9 00:34:30.497000 audit: BPF prog-id=124 op=UNLOAD Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.497000 audit: BPF prog-id=126 op=LOAD Sep 9 00:34:30.497000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2963 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934346432376535386166323061353030613632633231313935623838 Sep 9 00:34:30.500032 kubelet[1447]: E0909 00:34:30.500000 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:30.500073 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 9 00:34:30.516257 env[1210]: time="2025-09-09T00:34:30.516210050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f5b6bc43-6c7e-405d-aa2f-3dadd4198203,Namespace:default,Attempt:0,} returns sandbox id \"944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a\"" Sep 9 00:34:30.517897 env[1210]: time="2025-09-09T00:34:30.517868340Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 9 00:34:30.773212 env[1210]: time="2025-09-09T00:34:30.773128235Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:30.774809 env[1210]: time="2025-09-09T00:34:30.774752084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:30.776835 env[1210]: time="2025-09-09T00:34:30.776803586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:30.778587 env[1210]: time="2025-09-09T00:34:30.778527359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 9 00:34:30.779293 env[1210]: time="2025-09-09T00:34:30.779245620Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 9 00:34:30.782001 env[1210]: time="2025-09-09T00:34:30.781969463Z" level=info msg="CreateContainer within sandbox \"944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 9 00:34:30.793392 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount845893554.mount: Deactivated successfully. Sep 9 00:34:30.799217 env[1210]: time="2025-09-09T00:34:30.799177064Z" level=info msg="CreateContainer within sandbox \"944d27e58af20a500a62c21195b881324aa9bd2e9b4198ee380624780b612e1a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e70ffc2e1948f60d832eda2d4a7378bbc030a09f42a4f7f16836f915bdd7dfc7\"" Sep 9 00:34:30.799870 env[1210]: time="2025-09-09T00:34:30.799842725Z" level=info msg="StartContainer for \"e70ffc2e1948f60d832eda2d4a7378bbc030a09f42a4f7f16836f915bdd7dfc7\"" Sep 9 00:34:30.815740 systemd[1]: Started cri-containerd-e70ffc2e1948f60d832eda2d4a7378bbc030a09f42a4f7f16836f915bdd7dfc7.scope. Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit: BPF prog-id=127 op=LOAD Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2963 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306666633265313934386636306438333265646132643461373337 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2963 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306666633265313934386636306438333265646132643461373337 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit: BPF prog-id=128 op=LOAD Sep 9 00:34:30.832000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2963 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306666633265313934386636306438333265646132643461373337 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit: BPF prog-id=129 op=LOAD Sep 9 00:34:30.832000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2963 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306666633265313934386636306438333265646132643461373337 Sep 9 00:34:30.832000 audit: BPF prog-id=129 op=UNLOAD Sep 9 00:34:30.832000 audit: BPF prog-id=128 op=UNLOAD Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 9 00:34:30.832000 audit: BPF prog-id=130 op=LOAD Sep 9 00:34:30.832000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2963 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 9 00:34:30.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306666633265313934386636306438333265646132643461373337 Sep 9 00:34:30.850166 env[1210]: time="2025-09-09T00:34:30.850124128Z" level=info msg="StartContainer for \"e70ffc2e1948f60d832eda2d4a7378bbc030a09f42a4f7f16836f915bdd7dfc7\" returns successfully" Sep 9 00:34:31.500222 kubelet[1447]: E0909 00:34:31.500175 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:31.831301 kubelet[1447]: I0909 00:34:31.831227 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.567961718 podStartE2EDuration="16.831206935s" podCreationTimestamp="2025-09-09 00:34:15 +0000 UTC" firstStartedPulling="2025-09-09 00:34:30.517400886 +0000 UTC m=+50.835435538" lastFinishedPulling="2025-09-09 00:34:30.780646063 +0000 UTC m=+51.098680755" observedRunningTime="2025-09-09 00:34:31.831074651 +0000 UTC m=+52.149109303" watchObservedRunningTime="2025-09-09 00:34:31.831206935 +0000 UTC m=+52.149241587" Sep 9 00:34:31.836965 systemd-networkd[1038]: cali5ec59c6bf6e: Gained IPv6LL Sep 9 00:34:32.502380 kubelet[1447]: E0909 00:34:32.500674 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:33.500899 kubelet[1447]: E0909 00:34:33.500814 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:34.501327 kubelet[1447]: E0909 00:34:34.501273 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:35.504671 kubelet[1447]: E0909 00:34:35.504551 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:36.505682 kubelet[1447]: E0909 00:34:36.505629 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:37.505984 kubelet[1447]: E0909 00:34:37.505942 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 9 00:34:38.507498 kubelet[1447]: E0909 00:34:38.507281 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"