Sep 10 00:52:00.828581 kernel: Linux version 5.15.191-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Sep 9 23:10:34 -00 2025 Sep 10 00:52:00.828598 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ebdf135b7dd8c9596dea7f2ca48bf31be0143f7cba32a9cc0282a66ca6db3272 Sep 10 00:52:00.828608 kernel: BIOS-provided physical RAM map: Sep 10 00:52:00.828614 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 10 00:52:00.828619 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Sep 10 00:52:00.828624 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Sep 10 00:52:00.828631 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Sep 10 00:52:00.828637 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Sep 10 00:52:00.828643 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Sep 10 00:52:00.828649 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Sep 10 00:52:00.828656 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Sep 10 00:52:00.828663 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Sep 10 00:52:00.828668 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Sep 10 00:52:00.828674 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Sep 10 00:52:00.828681 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Sep 10 00:52:00.828688 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Sep 10 00:52:00.828694 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Sep 10 00:52:00.828700 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Sep 10 00:52:00.828706 kernel: NX (Execute Disable) protection: active Sep 10 00:52:00.828712 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Sep 10 00:52:00.828718 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Sep 10 00:52:00.828723 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Sep 10 00:52:00.828729 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Sep 10 00:52:00.828735 kernel: extended physical RAM map: Sep 10 00:52:00.828741 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 10 00:52:00.828747 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Sep 10 00:52:00.828753 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Sep 10 00:52:00.828759 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Sep 10 00:52:00.828765 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Sep 10 00:52:00.828771 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Sep 10 00:52:00.828777 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Sep 10 00:52:00.828782 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Sep 10 00:52:00.828788 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Sep 10 00:52:00.828794 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Sep 10 00:52:00.828800 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Sep 10 00:52:00.828806 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Sep 10 00:52:00.828812 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Sep 10 00:52:00.828818 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Sep 10 00:52:00.828824 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Sep 10 00:52:00.828830 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Sep 10 00:52:00.828838 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Sep 10 00:52:00.828845 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Sep 10 00:52:00.828851 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Sep 10 00:52:00.828858 kernel: efi: EFI v2.70 by EDK II Sep 10 00:52:00.828864 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Sep 10 00:52:00.828871 kernel: random: crng init done Sep 10 00:52:00.828877 kernel: SMBIOS 2.8 present. Sep 10 00:52:00.828883 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Sep 10 00:52:00.828890 kernel: Hypervisor detected: KVM Sep 10 00:52:00.828896 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 10 00:52:00.828902 kernel: kvm-clock: cpu 0, msr 6f19f001, primary cpu clock Sep 10 00:52:00.828909 kernel: kvm-clock: using sched offset of 4808982100 cycles Sep 10 00:52:00.828917 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 10 00:52:00.828923 kernel: tsc: Detected 2794.748 MHz processor Sep 10 00:52:00.828930 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 10 00:52:00.828936 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 10 00:52:00.828943 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Sep 10 00:52:00.828949 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 10 00:52:00.828956 kernel: Using GB pages for direct mapping Sep 10 00:52:00.828962 kernel: Secure boot disabled Sep 10 00:52:00.828969 kernel: ACPI: Early table checksum verification disabled Sep 10 00:52:00.828977 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Sep 10 00:52:00.828983 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Sep 10 00:52:00.828990 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 10 00:52:00.828996 kernel: ACPI: DSDT 0x000000009CB7A000 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 10 00:52:00.829003 kernel: ACPI: FACS 0x000000009CBDD000 000040 Sep 10 00:52:00.829009 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 10 00:52:00.829016 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 10 00:52:00.829022 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 10 00:52:00.829029 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 10 00:52:00.829036 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Sep 10 00:52:00.829043 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Sep 10 00:52:00.829049 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1b9] Sep 10 00:52:00.829056 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Sep 10 00:52:00.829062 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Sep 10 00:52:00.829069 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Sep 10 00:52:00.829075 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Sep 10 00:52:00.829081 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Sep 10 00:52:00.829088 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Sep 10 00:52:00.829095 kernel: No NUMA configuration found Sep 10 00:52:00.829101 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Sep 10 00:52:00.829108 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Sep 10 00:52:00.829114 kernel: Zone ranges: Sep 10 00:52:00.829121 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 10 00:52:00.829127 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Sep 10 00:52:00.829134 kernel: Normal empty Sep 10 00:52:00.829150 kernel: Movable zone start for each node Sep 10 00:52:00.829157 kernel: Early memory node ranges Sep 10 00:52:00.829164 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 10 00:52:00.829171 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Sep 10 00:52:00.829177 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Sep 10 00:52:00.829183 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Sep 10 00:52:00.829190 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Sep 10 00:52:00.829196 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Sep 10 00:52:00.829203 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Sep 10 00:52:00.829209 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 10 00:52:00.829215 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 10 00:52:00.829222 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Sep 10 00:52:00.829230 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 10 00:52:00.829236 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Sep 10 00:52:00.829243 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Sep 10 00:52:00.829249 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Sep 10 00:52:00.829256 kernel: ACPI: PM-Timer IO Port: 0x608 Sep 10 00:52:00.829262 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 10 00:52:00.829269 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 10 00:52:00.829275 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 10 00:52:00.829282 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 10 00:52:00.829289 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 10 00:52:00.829296 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 10 00:52:00.829302 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 10 00:52:00.829309 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 10 00:52:00.829315 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 10 00:52:00.829322 kernel: TSC deadline timer available Sep 10 00:52:00.829328 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Sep 10 00:52:00.829335 kernel: kvm-guest: KVM setup pv remote TLB flush Sep 10 00:52:00.829341 kernel: kvm-guest: setup PV sched yield Sep 10 00:52:00.829349 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Sep 10 00:52:00.829355 kernel: Booting paravirtualized kernel on KVM Sep 10 00:52:00.829366 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 10 00:52:00.829374 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Sep 10 00:52:00.829381 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Sep 10 00:52:00.829388 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Sep 10 00:52:00.829394 kernel: pcpu-alloc: [0] 0 1 2 3 Sep 10 00:52:00.829401 kernel: kvm-guest: setup async PF for cpu 0 Sep 10 00:52:00.829408 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Sep 10 00:52:00.829414 kernel: kvm-guest: PV spinlocks enabled Sep 10 00:52:00.829421 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 10 00:52:00.829428 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Sep 10 00:52:00.829436 kernel: Policy zone: DMA32 Sep 10 00:52:00.829444 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ebdf135b7dd8c9596dea7f2ca48bf31be0143f7cba32a9cc0282a66ca6db3272 Sep 10 00:52:00.829451 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 10 00:52:00.829458 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 10 00:52:00.829466 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 10 00:52:00.829473 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 10 00:52:00.829480 kernel: Memory: 2397432K/2567000K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 169308K reserved, 0K cma-reserved) Sep 10 00:52:00.829487 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Sep 10 00:52:00.829494 kernel: ftrace: allocating 34612 entries in 136 pages Sep 10 00:52:00.829501 kernel: ftrace: allocated 136 pages with 2 groups Sep 10 00:52:00.829508 kernel: rcu: Hierarchical RCU implementation. Sep 10 00:52:00.829515 kernel: rcu: RCU event tracing is enabled. Sep 10 00:52:00.829522 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Sep 10 00:52:00.829530 kernel: Rude variant of Tasks RCU enabled. Sep 10 00:52:00.829537 kernel: Tracing variant of Tasks RCU enabled. Sep 10 00:52:00.829551 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 10 00:52:00.829558 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Sep 10 00:52:00.829565 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Sep 10 00:52:00.829572 kernel: Console: colour dummy device 80x25 Sep 10 00:52:00.829579 kernel: printk: console [ttyS0] enabled Sep 10 00:52:00.829585 kernel: ACPI: Core revision 20210730 Sep 10 00:52:00.829592 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Sep 10 00:52:00.829600 kernel: APIC: Switch to symmetric I/O mode setup Sep 10 00:52:00.829607 kernel: x2apic enabled Sep 10 00:52:00.829614 kernel: Switched APIC routing to physical x2apic. Sep 10 00:52:00.829621 kernel: kvm-guest: setup PV IPIs Sep 10 00:52:00.829627 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Sep 10 00:52:00.829634 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Sep 10 00:52:00.829641 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Sep 10 00:52:00.829648 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 10 00:52:00.829655 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Sep 10 00:52:00.829663 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Sep 10 00:52:00.829670 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 10 00:52:00.829676 kernel: Spectre V2 : Mitigation: Retpolines Sep 10 00:52:00.829683 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 10 00:52:00.829690 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Sep 10 00:52:00.829697 kernel: active return thunk: retbleed_return_thunk Sep 10 00:52:00.829705 kernel: RETBleed: Mitigation: untrained return thunk Sep 10 00:52:00.829713 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 10 00:52:00.829721 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 10 00:52:00.829729 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 10 00:52:00.829738 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 10 00:52:00.829745 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 10 00:52:00.829753 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 10 00:52:00.829761 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Sep 10 00:52:00.829768 kernel: Freeing SMP alternatives memory: 32K Sep 10 00:52:00.829775 kernel: pid_max: default: 32768 minimum: 301 Sep 10 00:52:00.829782 kernel: LSM: Security Framework initializing Sep 10 00:52:00.829788 kernel: SELinux: Initializing. Sep 10 00:52:00.829797 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 10 00:52:00.829804 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 10 00:52:00.829811 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Sep 10 00:52:00.829817 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Sep 10 00:52:00.829824 kernel: ... version: 0 Sep 10 00:52:00.829831 kernel: ... bit width: 48 Sep 10 00:52:00.829838 kernel: ... generic registers: 6 Sep 10 00:52:00.829845 kernel: ... value mask: 0000ffffffffffff Sep 10 00:52:00.829851 kernel: ... max period: 00007fffffffffff Sep 10 00:52:00.829859 kernel: ... fixed-purpose events: 0 Sep 10 00:52:00.829866 kernel: ... event mask: 000000000000003f Sep 10 00:52:00.829873 kernel: signal: max sigframe size: 1776 Sep 10 00:52:00.829879 kernel: rcu: Hierarchical SRCU implementation. Sep 10 00:52:00.829886 kernel: smp: Bringing up secondary CPUs ... Sep 10 00:52:00.829893 kernel: x86: Booting SMP configuration: Sep 10 00:52:00.829900 kernel: .... node #0, CPUs: #1 Sep 10 00:52:00.829907 kernel: kvm-clock: cpu 1, msr 6f19f041, secondary cpu clock Sep 10 00:52:00.829913 kernel: kvm-guest: setup async PF for cpu 1 Sep 10 00:52:00.829921 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Sep 10 00:52:00.829928 kernel: #2 Sep 10 00:52:00.829935 kernel: kvm-clock: cpu 2, msr 6f19f081, secondary cpu clock Sep 10 00:52:00.829941 kernel: kvm-guest: setup async PF for cpu 2 Sep 10 00:52:00.829948 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Sep 10 00:52:00.829955 kernel: #3 Sep 10 00:52:00.829962 kernel: kvm-clock: cpu 3, msr 6f19f0c1, secondary cpu clock Sep 10 00:52:00.829968 kernel: kvm-guest: setup async PF for cpu 3 Sep 10 00:52:00.829975 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Sep 10 00:52:00.829982 kernel: smp: Brought up 1 node, 4 CPUs Sep 10 00:52:00.829990 kernel: smpboot: Max logical packages: 1 Sep 10 00:52:00.829997 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Sep 10 00:52:00.830003 kernel: devtmpfs: initialized Sep 10 00:52:00.830010 kernel: x86/mm: Memory block size: 128MB Sep 10 00:52:00.830017 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Sep 10 00:52:00.830024 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Sep 10 00:52:00.830031 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Sep 10 00:52:00.830038 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Sep 10 00:52:00.830045 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Sep 10 00:52:00.830053 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 10 00:52:00.830060 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Sep 10 00:52:00.830067 kernel: pinctrl core: initialized pinctrl subsystem Sep 10 00:52:00.830074 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 10 00:52:00.830080 kernel: audit: initializing netlink subsys (disabled) Sep 10 00:52:00.830087 kernel: audit: type=2000 audit(1757465520.650:1): state=initialized audit_enabled=0 res=1 Sep 10 00:52:00.830094 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 10 00:52:00.830101 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 10 00:52:00.830108 kernel: cpuidle: using governor menu Sep 10 00:52:00.830116 kernel: ACPI: bus type PCI registered Sep 10 00:52:00.830123 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 10 00:52:00.830130 kernel: dca service started, version 1.12.1 Sep 10 00:52:00.830137 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Sep 10 00:52:00.830161 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Sep 10 00:52:00.830168 kernel: PCI: Using configuration type 1 for base access Sep 10 00:52:00.830175 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 10 00:52:00.830182 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 10 00:52:00.830188 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 10 00:52:00.830197 kernel: ACPI: Added _OSI(Module Device) Sep 10 00:52:00.830203 kernel: ACPI: Added _OSI(Processor Device) Sep 10 00:52:00.830210 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 10 00:52:00.830217 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 10 00:52:00.830224 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 10 00:52:00.830231 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 10 00:52:00.830237 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 10 00:52:00.830244 kernel: ACPI: Interpreter enabled Sep 10 00:52:00.830251 kernel: ACPI: PM: (supports S0 S3 S5) Sep 10 00:52:00.830258 kernel: ACPI: Using IOAPIC for interrupt routing Sep 10 00:52:00.830265 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 10 00:52:00.830272 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Sep 10 00:52:00.830279 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 10 00:52:00.830388 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 10 00:52:00.830460 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Sep 10 00:52:00.830528 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Sep 10 00:52:00.830540 kernel: PCI host bridge to bus 0000:00 Sep 10 00:52:00.830659 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 10 00:52:00.830880 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 10 00:52:00.830947 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 10 00:52:00.831008 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Sep 10 00:52:00.831066 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 10 00:52:00.831126 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Sep 10 00:52:00.831208 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 10 00:52:00.831294 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Sep 10 00:52:00.831370 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Sep 10 00:52:00.831439 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Sep 10 00:52:00.831507 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Sep 10 00:52:00.831585 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Sep 10 00:52:00.831654 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Sep 10 00:52:00.831727 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 10 00:52:00.831810 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Sep 10 00:52:00.831884 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Sep 10 00:52:00.831953 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Sep 10 00:52:00.832022 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Sep 10 00:52:00.832096 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Sep 10 00:52:00.832183 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Sep 10 00:52:00.832253 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Sep 10 00:52:00.832321 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Sep 10 00:52:00.832394 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Sep 10 00:52:00.832463 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Sep 10 00:52:00.832531 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Sep 10 00:52:00.832616 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Sep 10 00:52:00.832692 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Sep 10 00:52:00.832765 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Sep 10 00:52:00.832832 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Sep 10 00:52:00.832903 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Sep 10 00:52:00.832969 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Sep 10 00:52:00.833035 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Sep 10 00:52:00.833108 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Sep 10 00:52:00.833191 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Sep 10 00:52:00.833202 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 10 00:52:00.833209 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 10 00:52:00.833216 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 10 00:52:00.833223 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 10 00:52:00.833230 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Sep 10 00:52:00.833236 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Sep 10 00:52:00.833243 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Sep 10 00:52:00.833252 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Sep 10 00:52:00.833259 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Sep 10 00:52:00.833266 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Sep 10 00:52:00.833273 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Sep 10 00:52:00.833280 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Sep 10 00:52:00.833287 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Sep 10 00:52:00.833293 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Sep 10 00:52:00.833300 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Sep 10 00:52:00.833307 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Sep 10 00:52:00.833315 kernel: iommu: Default domain type: Translated Sep 10 00:52:00.833322 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 10 00:52:00.833388 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Sep 10 00:52:00.833455 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 10 00:52:00.833522 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Sep 10 00:52:00.833531 kernel: vgaarb: loaded Sep 10 00:52:00.833538 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 10 00:52:00.833552 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 10 00:52:00.833559 kernel: PTP clock support registered Sep 10 00:52:00.833568 kernel: Registered efivars operations Sep 10 00:52:00.833575 kernel: PCI: Using ACPI for IRQ routing Sep 10 00:52:00.833582 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 10 00:52:00.833589 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Sep 10 00:52:00.833595 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Sep 10 00:52:00.833602 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Sep 10 00:52:00.833609 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Sep 10 00:52:00.833615 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Sep 10 00:52:00.833622 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Sep 10 00:52:00.833630 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Sep 10 00:52:00.833637 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Sep 10 00:52:00.833643 kernel: clocksource: Switched to clocksource kvm-clock Sep 10 00:52:00.833650 kernel: VFS: Disk quotas dquot_6.6.0 Sep 10 00:52:00.833657 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 10 00:52:00.833664 kernel: pnp: PnP ACPI init Sep 10 00:52:00.833747 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Sep 10 00:52:00.833760 kernel: pnp: PnP ACPI: found 6 devices Sep 10 00:52:00.833769 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 10 00:52:00.833776 kernel: NET: Registered PF_INET protocol family Sep 10 00:52:00.833783 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 10 00:52:00.833790 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 10 00:52:00.833797 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 10 00:52:00.833804 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 10 00:52:00.833811 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 10 00:52:00.833818 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 10 00:52:00.833825 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 10 00:52:00.833832 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 10 00:52:00.833839 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 10 00:52:00.833846 kernel: NET: Registered PF_XDP protocol family Sep 10 00:52:00.833915 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Sep 10 00:52:00.833985 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Sep 10 00:52:00.834046 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 10 00:52:00.834108 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 10 00:52:00.834183 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 10 00:52:00.834251 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Sep 10 00:52:00.834311 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Sep 10 00:52:00.834371 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Sep 10 00:52:00.834381 kernel: PCI: CLS 0 bytes, default 64 Sep 10 00:52:00.834388 kernel: Initialise system trusted keyrings Sep 10 00:52:00.834395 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 10 00:52:00.834401 kernel: Key type asymmetric registered Sep 10 00:52:00.834415 kernel: Asymmetric key parser 'x509' registered Sep 10 00:52:00.834433 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 10 00:52:00.834455 kernel: io scheduler mq-deadline registered Sep 10 00:52:00.834490 kernel: io scheduler kyber registered Sep 10 00:52:00.834500 kernel: io scheduler bfq registered Sep 10 00:52:00.834507 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 10 00:52:00.834515 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Sep 10 00:52:00.834522 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Sep 10 00:52:00.834529 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Sep 10 00:52:00.834536 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 10 00:52:00.834553 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 10 00:52:00.834560 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 10 00:52:00.834568 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 10 00:52:00.834575 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 10 00:52:00.834583 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 10 00:52:00.835580 kernel: rtc_cmos 00:04: RTC can wake from S4 Sep 10 00:52:00.835652 kernel: rtc_cmos 00:04: registered as rtc0 Sep 10 00:52:00.835716 kernel: rtc_cmos 00:04: setting system clock to 2025-09-10T00:52:00 UTC (1757465520) Sep 10 00:52:00.835785 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Sep 10 00:52:00.835795 kernel: efifb: probing for efifb Sep 10 00:52:00.835803 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Sep 10 00:52:00.835810 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Sep 10 00:52:00.835818 kernel: efifb: scrolling: redraw Sep 10 00:52:00.835825 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 10 00:52:00.835832 kernel: Console: switching to colour frame buffer device 160x50 Sep 10 00:52:00.835839 kernel: fb0: EFI VGA frame buffer device Sep 10 00:52:00.835847 kernel: pstore: Registered efi as persistent store backend Sep 10 00:52:00.835855 kernel: NET: Registered PF_INET6 protocol family Sep 10 00:52:00.835863 kernel: Segment Routing with IPv6 Sep 10 00:52:00.835870 kernel: In-situ OAM (IOAM) with IPv6 Sep 10 00:52:00.835879 kernel: NET: Registered PF_PACKET protocol family Sep 10 00:52:00.835886 kernel: Key type dns_resolver registered Sep 10 00:52:00.835893 kernel: IPI shorthand broadcast: enabled Sep 10 00:52:00.835901 kernel: sched_clock: Marking stable (454302348, 124619327)->(593897750, -14976075) Sep 10 00:52:00.835909 kernel: registered taskstats version 1 Sep 10 00:52:00.835916 kernel: Loading compiled-in X.509 certificates Sep 10 00:52:00.835923 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.191-flatcar: 3af57cd809cc9e43d7af9f276bb20b532a4147af' Sep 10 00:52:00.835930 kernel: Key type .fscrypt registered Sep 10 00:52:00.835938 kernel: Key type fscrypt-provisioning registered Sep 10 00:52:00.835945 kernel: pstore: Using crash dump compression: deflate Sep 10 00:52:00.835952 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 10 00:52:00.835961 kernel: ima: Allocated hash algorithm: sha1 Sep 10 00:52:00.835968 kernel: ima: No architecture policies found Sep 10 00:52:00.835975 kernel: clk: Disabling unused clocks Sep 10 00:52:00.835982 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 10 00:52:00.835990 kernel: Write protecting the kernel read-only data: 28672k Sep 10 00:52:00.835997 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 10 00:52:00.836004 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 10 00:52:00.836011 kernel: Run /init as init process Sep 10 00:52:00.836018 kernel: with arguments: Sep 10 00:52:00.836025 kernel: /init Sep 10 00:52:00.836033 kernel: with environment: Sep 10 00:52:00.836041 kernel: HOME=/ Sep 10 00:52:00.836048 kernel: TERM=linux Sep 10 00:52:00.836055 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 10 00:52:00.836064 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 10 00:52:00.836074 systemd[1]: Detected virtualization kvm. Sep 10 00:52:00.836082 systemd[1]: Detected architecture x86-64. Sep 10 00:52:00.836089 systemd[1]: Running in initrd. Sep 10 00:52:00.836098 systemd[1]: No hostname configured, using default hostname. Sep 10 00:52:00.836105 systemd[1]: Hostname set to . Sep 10 00:52:00.836113 systemd[1]: Initializing machine ID from VM UUID. Sep 10 00:52:00.836121 systemd[1]: Queued start job for default target initrd.target. Sep 10 00:52:00.836128 systemd[1]: Started systemd-ask-password-console.path. Sep 10 00:52:00.836136 systemd[1]: Reached target cryptsetup.target. Sep 10 00:52:00.836160 systemd[1]: Reached target paths.target. Sep 10 00:52:00.836168 systemd[1]: Reached target slices.target. Sep 10 00:52:00.836178 systemd[1]: Reached target swap.target. Sep 10 00:52:00.836185 systemd[1]: Reached target timers.target. Sep 10 00:52:00.836193 systemd[1]: Listening on iscsid.socket. Sep 10 00:52:00.836201 systemd[1]: Listening on iscsiuio.socket. Sep 10 00:52:00.836209 systemd[1]: Listening on systemd-journald-audit.socket. Sep 10 00:52:00.836216 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 10 00:52:00.836224 systemd[1]: Listening on systemd-journald.socket. Sep 10 00:52:00.836233 systemd[1]: Listening on systemd-networkd.socket. Sep 10 00:52:00.836240 systemd[1]: Listening on systemd-udevd-control.socket. Sep 10 00:52:00.836248 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 10 00:52:00.836255 systemd[1]: Reached target sockets.target. Sep 10 00:52:00.836263 systemd[1]: Starting kmod-static-nodes.service... Sep 10 00:52:00.836270 systemd[1]: Finished network-cleanup.service. Sep 10 00:52:00.836278 systemd[1]: Starting systemd-fsck-usr.service... Sep 10 00:52:00.836286 systemd[1]: Starting systemd-journald.service... Sep 10 00:52:00.836293 systemd[1]: Starting systemd-modules-load.service... Sep 10 00:52:00.836302 systemd[1]: Starting systemd-resolved.service... Sep 10 00:52:00.836309 systemd[1]: Starting systemd-vconsole-setup.service... Sep 10 00:52:00.836317 systemd[1]: Finished kmod-static-nodes.service. Sep 10 00:52:00.836325 systemd[1]: Finished systemd-fsck-usr.service. Sep 10 00:52:00.836333 kernel: audit: type=1130 audit(1757465520.827:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.836340 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 10 00:52:00.836350 systemd-journald[197]: Journal started Sep 10 00:52:00.836390 systemd-journald[197]: Runtime Journal (/run/log/journal/d74a3244aba94c009cd45c9f80259e22) is 6.0M, max 48.4M, 42.4M free. Sep 10 00:52:00.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.834825 systemd-modules-load[198]: Inserted module 'overlay' Sep 10 00:52:00.839167 systemd[1]: Started systemd-journald.service. Sep 10 00:52:00.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.842497 systemd[1]: Finished systemd-vconsole-setup.service. Sep 10 00:52:00.849513 kernel: audit: type=1130 audit(1757465520.842:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.849527 kernel: audit: type=1130 audit(1757465520.845:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.846107 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 10 00:52:00.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.853428 systemd-resolved[199]: Positive Trust Anchors: Sep 10 00:52:00.854367 kernel: audit: type=1130 audit(1757465520.851:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.853441 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 10 00:52:00.853467 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 10 00:52:00.854762 systemd[1]: Starting dracut-cmdline-ask.service... Sep 10 00:52:00.855659 systemd-resolved[199]: Defaulting to hostname 'linux'. Sep 10 00:52:00.856563 systemd[1]: Started systemd-resolved.service. Sep 10 00:52:00.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.857212 systemd[1]: Reached target nss-lookup.target. Sep 10 00:52:00.860584 kernel: audit: type=1130 audit(1757465520.856:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.864262 systemd[1]: Finished dracut-cmdline-ask.service. Sep 10 00:52:00.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.867905 systemd[1]: Starting dracut-cmdline.service... Sep 10 00:52:00.869794 kernel: audit: type=1130 audit(1757465520.864:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.875837 dracut-cmdline[216]: dracut-dracut-053 Sep 10 00:52:00.877778 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ebdf135b7dd8c9596dea7f2ca48bf31be0143f7cba32a9cc0282a66ca6db3272 Sep 10 00:52:00.900165 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 10 00:52:00.904635 systemd-modules-load[198]: Inserted module 'br_netfilter' Sep 10 00:52:00.905539 kernel: Bridge firewalling registered Sep 10 00:52:00.923169 kernel: SCSI subsystem initialized Sep 10 00:52:00.935169 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 10 00:52:00.935223 kernel: device-mapper: uevent: version 1.0.3 Sep 10 00:52:00.935240 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 10 00:52:00.939652 systemd-modules-load[198]: Inserted module 'dm_multipath' Sep 10 00:52:00.941213 systemd[1]: Finished systemd-modules-load.service. Sep 10 00:52:00.945651 kernel: audit: type=1130 audit(1757465520.941:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.945729 systemd[1]: Starting systemd-sysctl.service... Sep 10 00:52:00.949171 kernel: Loading iSCSI transport class v2.0-870. Sep 10 00:52:00.953742 systemd[1]: Finished systemd-sysctl.service. Sep 10 00:52:00.958322 kernel: audit: type=1130 audit(1757465520.954:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:00.969186 kernel: iscsi: registered transport (tcp) Sep 10 00:52:00.990665 kernel: iscsi: registered transport (qla4xxx) Sep 10 00:52:00.990698 kernel: QLogic iSCSI HBA Driver Sep 10 00:52:01.020270 systemd[1]: Finished dracut-cmdline.service. Sep 10 00:52:01.025390 kernel: audit: type=1130 audit(1757465521.020:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:01.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:01.022046 systemd[1]: Starting dracut-pre-udev.service... Sep 10 00:52:01.068184 kernel: raid6: avx2x4 gen() 29228 MB/s Sep 10 00:52:01.085176 kernel: raid6: avx2x4 xor() 7296 MB/s Sep 10 00:52:01.102175 kernel: raid6: avx2x2 gen() 32118 MB/s Sep 10 00:52:01.119165 kernel: raid6: avx2x2 xor() 19113 MB/s Sep 10 00:52:01.136173 kernel: raid6: avx2x1 gen() 25513 MB/s Sep 10 00:52:01.153175 kernel: raid6: avx2x1 xor() 15221 MB/s Sep 10 00:52:01.170170 kernel: raid6: sse2x4 gen() 14605 MB/s Sep 10 00:52:01.187175 kernel: raid6: sse2x4 xor() 6874 MB/s Sep 10 00:52:01.204168 kernel: raid6: sse2x2 gen() 15958 MB/s Sep 10 00:52:01.221168 kernel: raid6: sse2x2 xor() 9689 MB/s Sep 10 00:52:01.238176 kernel: raid6: sse2x1 gen() 11764 MB/s Sep 10 00:52:01.255494 kernel: raid6: sse2x1 xor() 7778 MB/s Sep 10 00:52:01.255525 kernel: raid6: using algorithm avx2x2 gen() 32118 MB/s Sep 10 00:52:01.255546 kernel: raid6: .... xor() 19113 MB/s, rmw enabled Sep 10 00:52:01.256192 kernel: raid6: using avx2x2 recovery algorithm Sep 10 00:52:01.269165 kernel: xor: automatically using best checksumming function avx Sep 10 00:52:01.358180 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 10 00:52:01.365746 systemd[1]: Finished dracut-pre-udev.service. Sep 10 00:52:01.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:01.367000 audit: BPF prog-id=7 op=LOAD Sep 10 00:52:01.367000 audit: BPF prog-id=8 op=LOAD Sep 10 00:52:01.367690 systemd[1]: Starting systemd-udevd.service... Sep 10 00:52:01.379562 systemd-udevd[400]: Using default interface naming scheme 'v252'. Sep 10 00:52:01.383291 systemd[1]: Started systemd-udevd.service. Sep 10 00:52:01.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:01.387758 systemd[1]: Starting dracut-pre-trigger.service... Sep 10 00:52:01.397162 dracut-pre-trigger[418]: rd.md=0: removing MD RAID activation Sep 10 00:52:01.422389 systemd[1]: Finished dracut-pre-trigger.service. Sep 10 00:52:01.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:01.424852 systemd[1]: Starting systemd-udev-trigger.service... Sep 10 00:52:01.456377 systemd[1]: Finished systemd-udev-trigger.service. Sep 10 00:52:01.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:01.488176 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Sep 10 00:52:01.494410 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 10 00:52:01.494431 kernel: GPT:9289727 != 19775487 Sep 10 00:52:01.494439 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 10 00:52:01.494447 kernel: GPT:9289727 != 19775487 Sep 10 00:52:01.494455 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 10 00:52:01.494464 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 10 00:52:01.496163 kernel: cryptd: max_cpu_qlen set to 1000 Sep 10 00:52:01.502160 kernel: libata version 3.00 loaded. Sep 10 00:52:01.510172 kernel: ahci 0000:00:1f.2: version 3.0 Sep 10 00:52:01.534845 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Sep 10 00:52:01.534871 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Sep 10 00:52:01.534988 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Sep 10 00:52:01.535088 kernel: AVX2 version of gcm_enc/dec engaged. Sep 10 00:52:01.535100 kernel: AES CTR mode by8 optimization enabled Sep 10 00:52:01.535112 kernel: scsi host0: ahci Sep 10 00:52:01.535254 kernel: scsi host1: ahci Sep 10 00:52:01.536595 kernel: scsi host2: ahci Sep 10 00:52:01.536687 kernel: scsi host3: ahci Sep 10 00:52:01.536825 kernel: scsi host4: ahci Sep 10 00:52:01.536987 kernel: scsi host5: ahci Sep 10 00:52:01.537182 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Sep 10 00:52:01.537200 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Sep 10 00:52:01.537212 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (458) Sep 10 00:52:01.537223 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Sep 10 00:52:01.537234 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Sep 10 00:52:01.537249 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Sep 10 00:52:01.537266 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Sep 10 00:52:01.533171 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 10 00:52:01.539311 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 10 00:52:01.540574 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 10 00:52:01.547400 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 10 00:52:01.551560 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 10 00:52:01.553310 systemd[1]: Starting disk-uuid.service... Sep 10 00:52:01.559992 disk-uuid[532]: Primary Header is updated. Sep 10 00:52:01.559992 disk-uuid[532]: Secondary Entries is updated. Sep 10 00:52:01.559992 disk-uuid[532]: Secondary Header is updated. Sep 10 00:52:01.564522 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 10 00:52:01.566177 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 10 00:52:01.849586 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 10 00:52:01.849664 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Sep 10 00:52:01.849684 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 10 00:52:01.849693 kernel: ata2: SATA link down (SStatus 0 SControl 300) Sep 10 00:52:01.849701 kernel: ata1: SATA link down (SStatus 0 SControl 300) Sep 10 00:52:01.851187 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 10 00:52:01.852182 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Sep 10 00:52:01.852201 kernel: ata3.00: applying bridge limits Sep 10 00:52:01.853413 kernel: ata3.00: configured for UDMA/100 Sep 10 00:52:01.854171 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Sep 10 00:52:01.887291 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Sep 10 00:52:01.904650 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 10 00:52:01.904665 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Sep 10 00:52:02.568520 disk-uuid[533]: The operation has completed successfully. Sep 10 00:52:02.569686 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 10 00:52:02.589490 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 10 00:52:02.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.589578 systemd[1]: Finished disk-uuid.service. Sep 10 00:52:02.596324 systemd[1]: Starting verity-setup.service... Sep 10 00:52:02.608157 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Sep 10 00:52:02.625844 systemd[1]: Found device dev-mapper-usr.device. Sep 10 00:52:02.626968 systemd[1]: Mounting sysusr-usr.mount... Sep 10 00:52:02.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.628956 systemd[1]: Finished verity-setup.service. Sep 10 00:52:02.685972 systemd[1]: Mounted sysusr-usr.mount. Sep 10 00:52:02.687670 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 10 00:52:02.686940 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 10 00:52:02.687666 systemd[1]: Starting ignition-setup.service... Sep 10 00:52:02.688260 systemd[1]: Starting parse-ip-for-networkd.service... Sep 10 00:52:02.701849 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 10 00:52:02.701874 kernel: BTRFS info (device vda6): using free space tree Sep 10 00:52:02.701884 kernel: BTRFS info (device vda6): has skinny extents Sep 10 00:52:02.709403 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 10 00:52:02.716695 systemd[1]: Finished ignition-setup.service. Sep 10 00:52:02.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.717503 systemd[1]: Starting ignition-fetch-offline.service... Sep 10 00:52:02.750701 ignition[661]: Ignition 2.14.0 Sep 10 00:52:02.750711 ignition[661]: Stage: fetch-offline Sep 10 00:52:02.750753 ignition[661]: no configs at "/usr/lib/ignition/base.d" Sep 10 00:52:02.750760 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 10 00:52:02.750843 ignition[661]: parsed url from cmdline: "" Sep 10 00:52:02.754376 systemd[1]: Finished parse-ip-for-networkd.service. Sep 10 00:52:02.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.756000 audit: BPF prog-id=9 op=LOAD Sep 10 00:52:02.750845 ignition[661]: no config URL provided Sep 10 00:52:02.750849 ignition[661]: reading system config file "/usr/lib/ignition/user.ign" Sep 10 00:52:02.756861 systemd[1]: Starting systemd-networkd.service... Sep 10 00:52:02.750855 ignition[661]: no config at "/usr/lib/ignition/user.ign" Sep 10 00:52:02.750870 ignition[661]: op(1): [started] loading QEMU firmware config module Sep 10 00:52:02.750874 ignition[661]: op(1): executing: "modprobe" "qemu_fw_cfg" Sep 10 00:52:02.756566 ignition[661]: op(1): [finished] loading QEMU firmware config module Sep 10 00:52:02.758974 ignition[661]: parsing config with SHA512: 0f1f59a669933e415605c5998befe90d7810b8bdb6990deb43d1efcd384e8de902b2e62758f0418cd517666eddce260e0caed0fa750c776576a344b918357aa7 Sep 10 00:52:02.762642 unknown[661]: fetched base config from "system" Sep 10 00:52:02.762906 ignition[661]: fetch-offline: fetch-offline passed Sep 10 00:52:02.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.762648 unknown[661]: fetched user config from "qemu" Sep 10 00:52:02.762954 ignition[661]: Ignition finished successfully Sep 10 00:52:02.764239 systemd[1]: Finished ignition-fetch-offline.service. Sep 10 00:52:02.779967 systemd-networkd[729]: lo: Link UP Sep 10 00:52:02.779976 systemd-networkd[729]: lo: Gained carrier Sep 10 00:52:02.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.780383 systemd-networkd[729]: Enumeration completed Sep 10 00:52:02.780447 systemd[1]: Started systemd-networkd.service. Sep 10 00:52:02.780638 systemd-networkd[729]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 10 00:52:02.782020 systemd-networkd[729]: eth0: Link UP Sep 10 00:52:02.782023 systemd-networkd[729]: eth0: Gained carrier Sep 10 00:52:02.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.782127 systemd[1]: Reached target network.target. Sep 10 00:52:02.783652 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Sep 10 00:52:02.784368 systemd[1]: Starting ignition-kargs.service... Sep 10 00:52:02.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.797889 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 10 00:52:02.797889 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 10 00:52:02.797889 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 10 00:52:02.797889 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 10 00:52:02.797889 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 10 00:52:02.797889 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 10 00:52:02.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.785898 systemd[1]: Starting iscsiuio.service... Sep 10 00:52:02.796406 ignition[731]: Ignition 2.14.0 Sep 10 00:52:02.789939 systemd[1]: Started iscsiuio.service. Sep 10 00:52:02.796412 ignition[731]: Stage: kargs Sep 10 00:52:02.791322 systemd[1]: Starting iscsid.service... Sep 10 00:52:02.796505 ignition[731]: no configs at "/usr/lib/ignition/base.d" Sep 10 00:52:02.794779 systemd[1]: Started iscsid.service. Sep 10 00:52:02.796513 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 10 00:52:02.796030 systemd[1]: Starting dracut-initqueue.service... Sep 10 00:52:02.797125 ignition[731]: kargs: kargs passed Sep 10 00:52:02.799446 systemd[1]: Finished ignition-kargs.service. Sep 10 00:52:02.797254 ignition[731]: Ignition finished successfully Sep 10 00:52:02.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.811419 systemd[1]: Starting ignition-disks.service... Sep 10 00:52:02.817045 ignition[749]: Ignition 2.14.0 Sep 10 00:52:02.812250 systemd-networkd[729]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Sep 10 00:52:02.817050 ignition[749]: Stage: disks Sep 10 00:52:02.819006 systemd[1]: Finished dracut-initqueue.service. Sep 10 00:52:02.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.817126 ignition[749]: no configs at "/usr/lib/ignition/base.d" Sep 10 00:52:02.820328 systemd[1]: Finished ignition-disks.service. Sep 10 00:52:02.817134 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 10 00:52:02.821841 systemd[1]: Reached target initrd-root-device.target. Sep 10 00:52:02.818252 ignition[749]: disks: disks passed Sep 10 00:52:02.823443 systemd[1]: Reached target local-fs-pre.target. Sep 10 00:52:02.818285 ignition[749]: Ignition finished successfully Sep 10 00:52:02.823512 systemd[1]: Reached target local-fs.target. Sep 10 00:52:02.823678 systemd[1]: Reached target remote-fs-pre.target. Sep 10 00:52:02.823837 systemd[1]: Reached target remote-cryptsetup.target. Sep 10 00:52:02.823996 systemd[1]: Reached target remote-fs.target. Sep 10 00:52:02.824323 systemd[1]: Reached target sysinit.target. Sep 10 00:52:02.824485 systemd[1]: Reached target basic.target. Sep 10 00:52:02.825415 systemd[1]: Starting dracut-pre-mount.service... Sep 10 00:52:02.847073 systemd-fsck[762]: ROOT: clean, 629/553520 files, 56028/553472 blocks Sep 10 00:52:02.832462 systemd[1]: Finished dracut-pre-mount.service. Sep 10 00:52:02.834111 systemd[1]: Starting systemd-fsck-root.service... Sep 10 00:52:02.851435 systemd[1]: Finished systemd-fsck-root.service. Sep 10 00:52:02.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.854135 systemd[1]: Mounting sysroot.mount... Sep 10 00:52:02.861171 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 10 00:52:02.861351 systemd[1]: Mounted sysroot.mount. Sep 10 00:52:02.862726 systemd[1]: Reached target initrd-root-fs.target. Sep 10 00:52:02.864993 systemd[1]: Mounting sysroot-usr.mount... Sep 10 00:52:02.866600 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 10 00:52:02.866633 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 10 00:52:02.867980 systemd[1]: Reached target ignition-diskful.target. Sep 10 00:52:02.871822 systemd[1]: Mounted sysroot-usr.mount. Sep 10 00:52:02.874527 systemd[1]: Starting initrd-setup-root.service... Sep 10 00:52:02.878683 initrd-setup-root[772]: cut: /sysroot/etc/passwd: No such file or directory Sep 10 00:52:02.883080 initrd-setup-root[780]: cut: /sysroot/etc/group: No such file or directory Sep 10 00:52:02.886917 initrd-setup-root[788]: cut: /sysroot/etc/shadow: No such file or directory Sep 10 00:52:02.890679 initrd-setup-root[796]: cut: /sysroot/etc/gshadow: No such file or directory Sep 10 00:52:02.915267 systemd[1]: Finished initrd-setup-root.service. Sep 10 00:52:02.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.917899 systemd[1]: Starting ignition-mount.service... Sep 10 00:52:02.920048 systemd[1]: Starting sysroot-boot.service... Sep 10 00:52:02.922368 bash[813]: umount: /sysroot/usr/share/oem: not mounted. Sep 10 00:52:02.931915 ignition[814]: INFO : Ignition 2.14.0 Sep 10 00:52:02.931915 ignition[814]: INFO : Stage: mount Sep 10 00:52:02.933901 ignition[814]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 10 00:52:02.933901 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 10 00:52:02.936438 ignition[814]: INFO : mount: mount passed Sep 10 00:52:02.936438 ignition[814]: INFO : Ignition finished successfully Sep 10 00:52:02.938882 systemd[1]: Finished ignition-mount.service. Sep 10 00:52:02.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:02.940758 systemd[1]: Finished sysroot-boot.service. Sep 10 00:52:02.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:03.636181 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 10 00:52:03.642172 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (824) Sep 10 00:52:03.642224 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 10 00:52:03.645018 kernel: BTRFS info (device vda6): using free space tree Sep 10 00:52:03.645032 kernel: BTRFS info (device vda6): has skinny extents Sep 10 00:52:03.648598 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 10 00:52:03.651508 systemd[1]: Starting ignition-files.service... Sep 10 00:52:03.664370 ignition[844]: INFO : Ignition 2.14.0 Sep 10 00:52:03.664370 ignition[844]: INFO : Stage: files Sep 10 00:52:03.666599 ignition[844]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 10 00:52:03.666599 ignition[844]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 10 00:52:03.666599 ignition[844]: DEBUG : files: compiled without relabeling support, skipping Sep 10 00:52:03.670075 ignition[844]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 10 00:52:03.671707 ignition[844]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 10 00:52:03.673669 ignition[844]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 10 00:52:03.673669 ignition[844]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 10 00:52:03.673669 ignition[844]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 10 00:52:03.673560 unknown[844]: wrote ssh authorized keys file for user: core Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 10 00:52:03.679066 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Sep 10 00:52:04.002340 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Sep 10 00:52:04.160632 systemd-networkd[729]: eth0: Gained IPv6LL Sep 10 00:52:04.450517 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 10 00:52:04.450517 ignition[844]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Sep 10 00:52:04.454171 ignition[844]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 10 00:52:04.456332 ignition[844]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 10 00:52:04.456332 ignition[844]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Sep 10 00:52:04.459782 ignition[844]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Sep 10 00:52:04.459782 ignition[844]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Sep 10 00:52:04.480877 ignition[844]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Sep 10 00:52:04.482529 ignition[844]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Sep 10 00:52:04.484162 ignition[844]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 10 00:52:04.486112 ignition[844]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 10 00:52:04.487943 ignition[844]: INFO : files: files passed Sep 10 00:52:04.487943 ignition[844]: INFO : Ignition finished successfully Sep 10 00:52:04.490067 systemd[1]: Finished ignition-files.service. Sep 10 00:52:04.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.492601 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 10 00:52:04.494740 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 10 00:52:04.497283 initrd-setup-root-after-ignition[868]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Sep 10 00:52:04.498908 initrd-setup-root-after-ignition[870]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 10 00:52:04.500698 systemd[1]: Starting ignition-quench.service... Sep 10 00:52:04.502549 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 10 00:52:04.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.504578 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 10 00:52:04.504646 systemd[1]: Finished ignition-quench.service. Sep 10 00:52:04.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.507151 systemd[1]: Reached target ignition-complete.target. Sep 10 00:52:04.509507 systemd[1]: Starting initrd-parse-etc.service... Sep 10 00:52:04.520284 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 10 00:52:04.521247 systemd[1]: Finished initrd-parse-etc.service. Sep 10 00:52:04.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.522900 systemd[1]: Reached target initrd-fs.target. Sep 10 00:52:04.524463 systemd[1]: Reached target initrd.target. Sep 10 00:52:04.525927 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 10 00:52:04.527655 systemd[1]: Starting dracut-pre-pivot.service... Sep 10 00:52:04.536476 systemd[1]: Finished dracut-pre-pivot.service. Sep 10 00:52:04.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.538659 systemd[1]: Starting initrd-cleanup.service... Sep 10 00:52:04.546449 systemd[1]: Stopped target nss-lookup.target. Sep 10 00:52:04.548043 systemd[1]: Stopped target remote-cryptsetup.target. Sep 10 00:52:04.549823 systemd[1]: Stopped target timers.target. Sep 10 00:52:04.551353 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 10 00:52:04.552327 systemd[1]: Stopped dracut-pre-pivot.service. Sep 10 00:52:04.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.554023 systemd[1]: Stopped target initrd.target. Sep 10 00:52:04.555532 systemd[1]: Stopped target basic.target. Sep 10 00:52:04.556998 systemd[1]: Stopped target ignition-complete.target. Sep 10 00:52:04.558730 systemd[1]: Stopped target ignition-diskful.target. Sep 10 00:52:04.560466 systemd[1]: Stopped target initrd-root-device.target. Sep 10 00:52:04.562209 systemd[1]: Stopped target remote-fs.target. Sep 10 00:52:04.563772 systemd[1]: Stopped target remote-fs-pre.target. Sep 10 00:52:04.565447 systemd[1]: Stopped target sysinit.target. Sep 10 00:52:04.566949 systemd[1]: Stopped target local-fs.target. Sep 10 00:52:04.568470 systemd[1]: Stopped target local-fs-pre.target. Sep 10 00:52:04.570085 systemd[1]: Stopped target swap.target. Sep 10 00:52:04.571521 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 10 00:52:04.572481 systemd[1]: Stopped dracut-pre-mount.service. Sep 10 00:52:04.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.574179 systemd[1]: Stopped target cryptsetup.target. Sep 10 00:52:04.575751 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 10 00:52:04.576751 systemd[1]: Stopped dracut-initqueue.service. Sep 10 00:52:04.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.578373 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 10 00:52:04.579394 systemd[1]: Stopped ignition-fetch-offline.service. Sep 10 00:52:04.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.581134 systemd[1]: Stopped target paths.target. Sep 10 00:52:04.582578 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 10 00:52:04.587204 systemd[1]: Stopped systemd-ask-password-console.path. Sep 10 00:52:04.588239 systemd[1]: Stopped target slices.target. Sep 10 00:52:04.588561 systemd[1]: Stopped target sockets.target. Sep 10 00:52:04.591012 systemd[1]: iscsid.socket: Deactivated successfully. Sep 10 00:52:04.591077 systemd[1]: Closed iscsid.socket. Sep 10 00:52:04.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.591746 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 10 00:52:04.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.591835 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 10 00:52:04.593976 systemd[1]: ignition-files.service: Deactivated successfully. Sep 10 00:52:04.594053 systemd[1]: Stopped ignition-files.service. Sep 10 00:52:04.595972 systemd[1]: Stopping ignition-mount.service... Sep 10 00:52:04.597255 systemd[1]: Stopping iscsiuio.service... Sep 10 00:52:04.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.604415 ignition[885]: INFO : Ignition 2.14.0 Sep 10 00:52:04.604415 ignition[885]: INFO : Stage: umount Sep 10 00:52:04.604415 ignition[885]: INFO : no configs at "/usr/lib/ignition/base.d" Sep 10 00:52:04.604415 ignition[885]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Sep 10 00:52:04.604415 ignition[885]: INFO : umount: umount passed Sep 10 00:52:04.604415 ignition[885]: INFO : Ignition finished successfully Sep 10 00:52:04.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.601199 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 10 00:52:04.601356 systemd[1]: Stopped kmod-static-nodes.service. Sep 10 00:52:04.603585 systemd[1]: Stopping sysroot-boot.service... Sep 10 00:52:04.604643 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 10 00:52:04.604783 systemd[1]: Stopped systemd-udev-trigger.service. Sep 10 00:52:04.607361 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 10 00:52:04.610384 systemd[1]: Stopped dracut-pre-trigger.service. Sep 10 00:52:04.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.620043 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 10 00:52:04.621674 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 10 00:52:04.622568 systemd[1]: Stopped iscsiuio.service. Sep 10 00:52:04.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.624252 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 10 00:52:04.625295 systemd[1]: Stopped ignition-mount.service. Sep 10 00:52:04.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.627125 systemd[1]: Stopped target network.target. Sep 10 00:52:04.628808 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 10 00:52:04.628839 systemd[1]: Closed iscsiuio.socket. Sep 10 00:52:04.630948 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 10 00:52:04.631831 systemd[1]: Stopped ignition-disks.service. Sep 10 00:52:04.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.633307 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 10 00:52:04.633337 systemd[1]: Stopped ignition-kargs.service. Sep 10 00:52:04.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.635671 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 10 00:52:04.635711 systemd[1]: Stopped ignition-setup.service. Sep 10 00:52:04.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.637500 systemd[1]: Stopping systemd-networkd.service... Sep 10 00:52:04.639817 systemd[1]: Stopping systemd-resolved.service... Sep 10 00:52:04.641493 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 10 00:52:04.641556 systemd[1]: Finished initrd-cleanup.service. Sep 10 00:52:04.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.645188 systemd-networkd[729]: eth0: DHCPv6 lease lost Sep 10 00:52:04.646172 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 10 00:52:04.647180 systemd[1]: Stopped systemd-networkd.service. Sep 10 00:52:04.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.649333 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 10 00:52:04.650332 systemd[1]: Stopped systemd-resolved.service. Sep 10 00:52:04.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.652477 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 10 00:52:04.652507 systemd[1]: Closed systemd-networkd.socket. Sep 10 00:52:04.653000 audit: BPF prog-id=9 op=UNLOAD Sep 10 00:52:04.655510 systemd[1]: Stopping network-cleanup.service... Sep 10 00:52:04.656000 audit: BPF prog-id=6 op=UNLOAD Sep 10 00:52:04.656347 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 10 00:52:04.656382 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 10 00:52:04.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.659877 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 10 00:52:04.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.659913 systemd[1]: Stopped systemd-sysctl.service. Sep 10 00:52:04.661652 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 10 00:52:04.663301 systemd[1]: Stopped systemd-modules-load.service. Sep 10 00:52:04.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.665061 systemd[1]: Stopping systemd-udevd.service... Sep 10 00:52:04.667849 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 10 00:52:04.670789 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 10 00:52:04.671758 systemd[1]: Stopped network-cleanup.service. Sep 10 00:52:04.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.673677 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 10 00:52:04.674688 systemd[1]: Stopped systemd-udevd.service. Sep 10 00:52:04.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.676540 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 10 00:52:04.676572 systemd[1]: Closed systemd-udevd-control.socket. Sep 10 00:52:04.679253 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 10 00:52:04.679282 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 10 00:52:04.681902 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 10 00:52:04.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.681937 systemd[1]: Stopped dracut-pre-udev.service. Sep 10 00:52:04.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.683710 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 10 00:52:04.683750 systemd[1]: Stopped dracut-cmdline.service. Sep 10 00:52:04.685309 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 10 00:52:04.685339 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 10 00:52:04.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.689789 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 10 00:52:04.691531 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 10 00:52:04.691573 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 10 00:52:04.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.694709 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 10 00:52:04.695864 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 10 00:52:04.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.712395 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 10 00:52:04.713343 systemd[1]: Stopped sysroot-boot.service. Sep 10 00:52:04.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.714821 systemd[1]: Reached target initrd-switch-root.target. Sep 10 00:52:04.716522 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 10 00:52:04.717464 systemd[1]: Stopped initrd-setup-root.service. Sep 10 00:52:04.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:04.719602 systemd[1]: Starting initrd-switch-root.service... Sep 10 00:52:04.736136 systemd[1]: Switching root. Sep 10 00:52:04.753798 iscsid[740]: iscsid shutting down. Sep 10 00:52:04.754532 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Sep 10 00:52:04.754571 systemd-journald[197]: Journal stopped Sep 10 00:52:07.179173 kernel: SELinux: Class mctp_socket not defined in policy. Sep 10 00:52:07.179223 kernel: SELinux: Class anon_inode not defined in policy. Sep 10 00:52:07.179240 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 10 00:52:07.179250 kernel: SELinux: policy capability network_peer_controls=1 Sep 10 00:52:07.179260 kernel: SELinux: policy capability open_perms=1 Sep 10 00:52:07.179270 kernel: SELinux: policy capability extended_socket_class=1 Sep 10 00:52:07.179279 kernel: SELinux: policy capability always_check_network=0 Sep 10 00:52:07.179289 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 10 00:52:07.179298 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 10 00:52:07.179310 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 10 00:52:07.179324 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 10 00:52:07.179334 systemd[1]: Successfully loaded SELinux policy in 37.386ms. Sep 10 00:52:07.179351 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.288ms. Sep 10 00:52:07.179373 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 10 00:52:07.179384 systemd[1]: Detected virtualization kvm. Sep 10 00:52:07.179395 systemd[1]: Detected architecture x86-64. Sep 10 00:52:07.179408 systemd[1]: Detected first boot. Sep 10 00:52:07.179420 systemd[1]: Initializing machine ID from VM UUID. Sep 10 00:52:07.179431 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 10 00:52:07.179443 systemd[1]: Populated /etc with preset unit settings. Sep 10 00:52:07.179453 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 10 00:52:07.179467 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 10 00:52:07.179479 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 10 00:52:07.179490 kernel: kauditd_printk_skb: 80 callbacks suppressed Sep 10 00:52:07.179501 kernel: audit: type=1334 audit(1757465527.043:84): prog-id=12 op=LOAD Sep 10 00:52:07.179510 kernel: audit: type=1334 audit(1757465527.043:85): prog-id=3 op=UNLOAD Sep 10 00:52:07.179520 kernel: audit: type=1334 audit(1757465527.044:86): prog-id=13 op=LOAD Sep 10 00:52:07.179529 kernel: audit: type=1334 audit(1757465527.046:87): prog-id=14 op=LOAD Sep 10 00:52:07.179538 kernel: audit: type=1334 audit(1757465527.046:88): prog-id=4 op=UNLOAD Sep 10 00:52:07.179547 kernel: audit: type=1334 audit(1757465527.046:89): prog-id=5 op=UNLOAD Sep 10 00:52:07.179558 kernel: audit: type=1334 audit(1757465527.048:90): prog-id=15 op=LOAD Sep 10 00:52:07.179570 kernel: audit: type=1334 audit(1757465527.048:91): prog-id=12 op=UNLOAD Sep 10 00:52:07.179582 kernel: audit: type=1334 audit(1757465527.050:92): prog-id=16 op=LOAD Sep 10 00:52:07.179595 kernel: audit: type=1334 audit(1757465527.052:93): prog-id=17 op=LOAD Sep 10 00:52:07.179607 systemd[1]: iscsid.service: Deactivated successfully. Sep 10 00:52:07.179620 systemd[1]: Stopped iscsid.service. Sep 10 00:52:07.179633 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 10 00:52:07.179645 systemd[1]: Stopped initrd-switch-root.service. Sep 10 00:52:07.179658 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 10 00:52:07.179671 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 10 00:52:07.179686 systemd[1]: Created slice system-addon\x2drun.slice. Sep 10 00:52:07.179699 systemd[1]: Created slice system-getty.slice. Sep 10 00:52:07.179709 systemd[1]: Created slice system-modprobe.slice. Sep 10 00:52:07.179720 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 10 00:52:07.179730 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 10 00:52:07.179741 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 10 00:52:07.179751 systemd[1]: Created slice user.slice. Sep 10 00:52:07.179761 systemd[1]: Started systemd-ask-password-console.path. Sep 10 00:52:07.179773 systemd[1]: Started systemd-ask-password-wall.path. Sep 10 00:52:07.179783 systemd[1]: Set up automount boot.automount. Sep 10 00:52:07.179793 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 10 00:52:07.179803 systemd[1]: Stopped target initrd-switch-root.target. Sep 10 00:52:07.179813 systemd[1]: Stopped target initrd-fs.target. Sep 10 00:52:07.179824 systemd[1]: Stopped target initrd-root-fs.target. Sep 10 00:52:07.179836 systemd[1]: Reached target integritysetup.target. Sep 10 00:52:07.179847 systemd[1]: Reached target remote-cryptsetup.target. Sep 10 00:52:07.179857 systemd[1]: Reached target remote-fs.target. Sep 10 00:52:07.179868 systemd[1]: Reached target slices.target. Sep 10 00:52:07.179878 systemd[1]: Reached target swap.target. Sep 10 00:52:07.179888 systemd[1]: Reached target torcx.target. Sep 10 00:52:07.179898 systemd[1]: Reached target veritysetup.target. Sep 10 00:52:07.179909 systemd[1]: Listening on systemd-coredump.socket. Sep 10 00:52:07.179918 systemd[1]: Listening on systemd-initctl.socket. Sep 10 00:52:07.179929 systemd[1]: Listening on systemd-networkd.socket. Sep 10 00:52:07.179941 systemd[1]: Listening on systemd-udevd-control.socket. Sep 10 00:52:07.179951 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 10 00:52:07.179961 systemd[1]: Listening on systemd-userdbd.socket. Sep 10 00:52:07.179971 systemd[1]: Mounting dev-hugepages.mount... Sep 10 00:52:07.179982 systemd[1]: Mounting dev-mqueue.mount... Sep 10 00:52:07.179992 systemd[1]: Mounting media.mount... Sep 10 00:52:07.180003 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:07.180013 systemd[1]: Mounting sys-kernel-debug.mount... Sep 10 00:52:07.180024 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 10 00:52:07.180034 systemd[1]: Mounting tmp.mount... Sep 10 00:52:07.180044 systemd[1]: Starting flatcar-tmpfiles.service... Sep 10 00:52:07.180055 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 10 00:52:07.180065 systemd[1]: Starting kmod-static-nodes.service... Sep 10 00:52:07.180076 systemd[1]: Starting modprobe@configfs.service... Sep 10 00:52:07.180085 systemd[1]: Starting modprobe@dm_mod.service... Sep 10 00:52:07.180096 systemd[1]: Starting modprobe@drm.service... Sep 10 00:52:07.180106 systemd[1]: Starting modprobe@efi_pstore.service... Sep 10 00:52:07.180118 systemd[1]: Starting modprobe@fuse.service... Sep 10 00:52:07.180128 systemd[1]: Starting modprobe@loop.service... Sep 10 00:52:07.180139 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 10 00:52:07.180198 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 10 00:52:07.180209 systemd[1]: Stopped systemd-fsck-root.service. Sep 10 00:52:07.180218 kernel: loop: module loaded Sep 10 00:52:07.180229 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 10 00:52:07.180239 systemd[1]: Stopped systemd-fsck-usr.service. Sep 10 00:52:07.180248 kernel: fuse: init (API version 7.34) Sep 10 00:52:07.180259 systemd[1]: Stopped systemd-journald.service. Sep 10 00:52:07.180269 systemd[1]: Starting systemd-journald.service... Sep 10 00:52:07.180280 systemd[1]: Starting systemd-modules-load.service... Sep 10 00:52:07.180290 systemd[1]: Starting systemd-network-generator.service... Sep 10 00:52:07.180300 systemd[1]: Starting systemd-remount-fs.service... Sep 10 00:52:07.180310 systemd[1]: Starting systemd-udev-trigger.service... Sep 10 00:52:07.180321 systemd[1]: verity-setup.service: Deactivated successfully. Sep 10 00:52:07.180331 systemd[1]: Stopped verity-setup.service. Sep 10 00:52:07.180342 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:07.180354 systemd[1]: Mounted dev-hugepages.mount. Sep 10 00:52:07.180376 systemd-journald[995]: Journal started Sep 10 00:52:07.180411 systemd-journald[995]: Runtime Journal (/run/log/journal/d74a3244aba94c009cd45c9f80259e22) is 6.0M, max 48.4M, 42.4M free. Sep 10 00:52:04.810000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 10 00:52:04.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 10 00:52:04.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 10 00:52:04.964000 audit: BPF prog-id=10 op=LOAD Sep 10 00:52:04.964000 audit: BPF prog-id=10 op=UNLOAD Sep 10 00:52:04.964000 audit: BPF prog-id=11 op=LOAD Sep 10 00:52:04.964000 audit: BPF prog-id=11 op=UNLOAD Sep 10 00:52:04.994000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 10 00:52:04.994000 audit[918]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:04.994000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 10 00:52:04.995000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 10 00:52:04.995000 audit[918]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:04.995000 audit: CWD cwd="/" Sep 10 00:52:04.995000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:04.995000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:04.995000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 10 00:52:07.043000 audit: BPF prog-id=12 op=LOAD Sep 10 00:52:07.043000 audit: BPF prog-id=3 op=UNLOAD Sep 10 00:52:07.044000 audit: BPF prog-id=13 op=LOAD Sep 10 00:52:07.046000 audit: BPF prog-id=14 op=LOAD Sep 10 00:52:07.046000 audit: BPF prog-id=4 op=UNLOAD Sep 10 00:52:07.046000 audit: BPF prog-id=5 op=UNLOAD Sep 10 00:52:07.048000 audit: BPF prog-id=15 op=LOAD Sep 10 00:52:07.048000 audit: BPF prog-id=12 op=UNLOAD Sep 10 00:52:07.050000 audit: BPF prog-id=16 op=LOAD Sep 10 00:52:07.052000 audit: BPF prog-id=17 op=LOAD Sep 10 00:52:07.052000 audit: BPF prog-id=13 op=UNLOAD Sep 10 00:52:07.052000 audit: BPF prog-id=14 op=UNLOAD Sep 10 00:52:07.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.064000 audit: BPF prog-id=15 op=UNLOAD Sep 10 00:52:07.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.160000 audit: BPF prog-id=18 op=LOAD Sep 10 00:52:07.160000 audit: BPF prog-id=19 op=LOAD Sep 10 00:52:07.160000 audit: BPF prog-id=20 op=LOAD Sep 10 00:52:07.160000 audit: BPF prog-id=16 op=UNLOAD Sep 10 00:52:07.160000 audit: BPF prog-id=17 op=UNLOAD Sep 10 00:52:07.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.178000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 10 00:52:07.178000 audit[995]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcd4ce5ad0 a2=4000 a3=7ffcd4ce5b6c items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:07.178000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 10 00:52:04.993016 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 10 00:52:07.041776 systemd[1]: Queued start job for default target multi-user.target. Sep 10 00:52:04.993223 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 10 00:52:07.041785 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 10 00:52:04.993238 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 10 00:52:07.053161 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 10 00:52:04.993262 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 10 00:52:04.993271 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 10 00:52:04.993294 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 10 00:52:04.993304 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 10 00:52:04.993493 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 10 00:52:04.993532 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 10 00:52:04.993546 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 10 00:52:04.993852 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 10 00:52:04.993881 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 10 00:52:04.993895 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 10 00:52:04.993907 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 10 00:52:04.993921 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 10 00:52:04.993933 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 10 00:52:06.795550 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 10 00:52:07.182833 systemd[1]: Started systemd-journald.service. Sep 10 00:52:06.795795 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 10 00:52:06.795885 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 10 00:52:07.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:06.796036 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 10 00:52:06.796079 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 10 00:52:06.796132 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-09-10T00:52:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 10 00:52:07.183358 systemd[1]: Mounted dev-mqueue.mount. Sep 10 00:52:07.184185 systemd[1]: Mounted media.mount. Sep 10 00:52:07.184937 systemd[1]: Mounted sys-kernel-debug.mount. Sep 10 00:52:07.185796 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 10 00:52:07.186687 systemd[1]: Mounted tmp.mount. Sep 10 00:52:07.187693 systemd[1]: Finished flatcar-tmpfiles.service. Sep 10 00:52:07.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.188975 systemd[1]: Finished kmod-static-nodes.service. Sep 10 00:52:07.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.190040 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 10 00:52:07.190245 systemd[1]: Finished modprobe@configfs.service. Sep 10 00:52:07.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.191457 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 10 00:52:07.191668 systemd[1]: Finished modprobe@dm_mod.service. Sep 10 00:52:07.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.192795 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 10 00:52:07.192976 systemd[1]: Finished modprobe@drm.service. Sep 10 00:52:07.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.193999 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 10 00:52:07.194214 systemd[1]: Finished modprobe@efi_pstore.service. Sep 10 00:52:07.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.195330 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 10 00:52:07.195512 systemd[1]: Finished modprobe@fuse.service. Sep 10 00:52:07.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.196523 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 10 00:52:07.196702 systemd[1]: Finished modprobe@loop.service. Sep 10 00:52:07.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.197786 systemd[1]: Finished systemd-modules-load.service. Sep 10 00:52:07.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.199012 systemd[1]: Finished systemd-network-generator.service. Sep 10 00:52:07.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.200167 systemd[1]: Finished systemd-remount-fs.service. Sep 10 00:52:07.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.201433 systemd[1]: Reached target network-pre.target. Sep 10 00:52:07.203409 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 10 00:52:07.205252 systemd[1]: Mounting sys-kernel-config.mount... Sep 10 00:52:07.206139 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 10 00:52:07.207479 systemd[1]: Starting systemd-hwdb-update.service... Sep 10 00:52:07.209212 systemd[1]: Starting systemd-journal-flush.service... Sep 10 00:52:07.210268 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 10 00:52:07.211045 systemd[1]: Starting systemd-random-seed.service... Sep 10 00:52:07.213676 systemd-journald[995]: Time spent on flushing to /var/log/journal/d74a3244aba94c009cd45c9f80259e22 is 15.531ms for 1141 entries. Sep 10 00:52:07.213676 systemd-journald[995]: System Journal (/var/log/journal/d74a3244aba94c009cd45c9f80259e22) is 8.0M, max 195.6M, 187.6M free. Sep 10 00:52:07.251612 systemd-journald[995]: Received client request to flush runtime journal. Sep 10 00:52:07.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.212033 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 10 00:52:07.212882 systemd[1]: Starting systemd-sysctl.service... Sep 10 00:52:07.215817 systemd[1]: Starting systemd-sysusers.service... Sep 10 00:52:07.218734 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 10 00:52:07.252425 udevadm[1023]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 10 00:52:07.222115 systemd[1]: Mounted sys-kernel-config.mount. Sep 10 00:52:07.225439 systemd[1]: Finished systemd-udev-trigger.service. Sep 10 00:52:07.226655 systemd[1]: Finished systemd-random-seed.service. Sep 10 00:52:07.227753 systemd[1]: Reached target first-boot-complete.target. Sep 10 00:52:07.229845 systemd[1]: Starting systemd-udev-settle.service... Sep 10 00:52:07.234013 systemd[1]: Finished systemd-sysctl.service. Sep 10 00:52:07.236671 systemd[1]: Finished systemd-sysusers.service. Sep 10 00:52:07.252241 systemd[1]: Finished systemd-journal-flush.service. Sep 10 00:52:07.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.610563 systemd[1]: Finished systemd-hwdb-update.service. Sep 10 00:52:07.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.612000 audit: BPF prog-id=21 op=LOAD Sep 10 00:52:07.612000 audit: BPF prog-id=22 op=LOAD Sep 10 00:52:07.612000 audit: BPF prog-id=7 op=UNLOAD Sep 10 00:52:07.612000 audit: BPF prog-id=8 op=UNLOAD Sep 10 00:52:07.612945 systemd[1]: Starting systemd-udevd.service... Sep 10 00:52:07.628174 systemd-udevd[1025]: Using default interface naming scheme 'v252'. Sep 10 00:52:07.640948 systemd[1]: Started systemd-udevd.service. Sep 10 00:52:07.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.644000 audit: BPF prog-id=23 op=LOAD Sep 10 00:52:07.645750 systemd[1]: Starting systemd-networkd.service... Sep 10 00:52:07.650000 audit: BPF prog-id=24 op=LOAD Sep 10 00:52:07.650000 audit: BPF prog-id=25 op=LOAD Sep 10 00:52:07.650000 audit: BPF prog-id=26 op=LOAD Sep 10 00:52:07.651250 systemd[1]: Starting systemd-userdbd.service... Sep 10 00:52:07.670527 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 10 00:52:07.680871 systemd[1]: Started systemd-userdbd.service. Sep 10 00:52:07.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.708483 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 10 00:52:07.713188 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Sep 10 00:52:07.718207 kernel: ACPI: button: Power Button [PWRF] Sep 10 00:52:07.731963 systemd-networkd[1034]: lo: Link UP Sep 10 00:52:07.732197 systemd-networkd[1034]: lo: Gained carrier Sep 10 00:52:07.732822 systemd-networkd[1034]: Enumeration completed Sep 10 00:52:07.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.732977 systemd[1]: Started systemd-networkd.service. Sep 10 00:52:07.734275 systemd-networkd[1034]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 10 00:52:07.735259 systemd-networkd[1034]: eth0: Link UP Sep 10 00:52:07.735323 systemd-networkd[1034]: eth0: Gained carrier Sep 10 00:52:07.728000 audit[1027]: AVC avc: denied { confidentiality } for pid=1027 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 10 00:52:07.728000 audit[1027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5570f784c0c0 a1=338ec a2=7f465ba19bc5 a3=5 items=110 ppid=1025 pid=1027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:07.728000 audit: CWD cwd="/" Sep 10 00:52:07.728000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=1 name=(null) inode=13684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=2 name=(null) inode=13684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=3 name=(null) inode=13685 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=4 name=(null) inode=13684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=5 name=(null) inode=13686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=6 name=(null) inode=13684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=7 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=8 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=9 name=(null) inode=13688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=10 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=11 name=(null) inode=13689 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=12 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=13 name=(null) inode=13690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=14 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=15 name=(null) inode=13691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=16 name=(null) inode=13687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=17 name=(null) inode=13692 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=18 name=(null) inode=13684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=19 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=20 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=21 name=(null) inode=13694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=22 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=23 name=(null) inode=13695 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=24 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=25 name=(null) inode=13696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=26 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=27 name=(null) inode=13697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=28 name=(null) inode=13693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=29 name=(null) inode=13698 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=30 name=(null) inode=13684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=31 name=(null) inode=13699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=32 name=(null) inode=13699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=33 name=(null) inode=13700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=34 name=(null) inode=13699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=35 name=(null) inode=13701 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=36 name=(null) inode=13699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=37 name=(null) inode=13702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=38 name=(null) inode=13699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=39 name=(null) inode=13703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=40 name=(null) inode=13699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=41 name=(null) inode=13704 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=42 name=(null) inode=13684 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=43 name=(null) inode=13705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=44 name=(null) inode=13705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=45 name=(null) inode=13706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=46 name=(null) inode=13705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=47 name=(null) inode=13707 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=48 name=(null) inode=13705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=49 name=(null) inode=13708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=50 name=(null) inode=13705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=51 name=(null) inode=13709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=52 name=(null) inode=13705 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=53 name=(null) inode=13710 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=55 name=(null) inode=13711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=56 name=(null) inode=13711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=57 name=(null) inode=13712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=58 name=(null) inode=13711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=59 name=(null) inode=13713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=60 name=(null) inode=13711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=61 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=62 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=63 name=(null) inode=13715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=64 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=65 name=(null) inode=13716 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=66 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=67 name=(null) inode=13717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=68 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=69 name=(null) inode=13718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=70 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=71 name=(null) inode=13719 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=72 name=(null) inode=13711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=73 name=(null) inode=13720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=74 name=(null) inode=13720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=75 name=(null) inode=13721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=76 name=(null) inode=13720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=77 name=(null) inode=13722 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=78 name=(null) inode=13720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=79 name=(null) inode=13723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=80 name=(null) inode=13720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=81 name=(null) inode=13724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=82 name=(null) inode=13720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=83 name=(null) inode=13725 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=84 name=(null) inode=13711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=85 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=86 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=87 name=(null) inode=13727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=88 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=89 name=(null) inode=13728 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=90 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=91 name=(null) inode=13729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=92 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=93 name=(null) inode=13730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=94 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=95 name=(null) inode=13731 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=96 name=(null) inode=13711 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=97 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=98 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=99 name=(null) inode=13733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=100 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=101 name=(null) inode=13734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=102 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=103 name=(null) inode=13735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=104 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=105 name=(null) inode=13736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=106 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=107 name=(null) inode=13737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.748174 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Sep 10 00:52:07.728000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PATH item=109 name=(null) inode=13738 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:07.728000 audit: PROCTITLE proctitle="(udev-worker)" Sep 10 00:52:07.749305 systemd-networkd[1034]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Sep 10 00:52:07.754691 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Sep 10 00:52:07.757359 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Sep 10 00:52:07.757479 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Sep 10 00:52:07.757579 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Sep 10 00:52:07.762162 kernel: mousedev: PS/2 mouse device common for all mice Sep 10 00:52:07.818583 kernel: kvm: Nested Virtualization enabled Sep 10 00:52:07.818671 kernel: SVM: kvm: Nested Paging enabled Sep 10 00:52:07.818685 kernel: SVM: Virtual VMLOAD VMSAVE supported Sep 10 00:52:07.819262 kernel: SVM: Virtual GIF supported Sep 10 00:52:07.835164 kernel: EDAC MC: Ver: 3.0.0 Sep 10 00:52:07.859522 systemd[1]: Finished systemd-udev-settle.service. Sep 10 00:52:07.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.861528 systemd[1]: Starting lvm2-activation-early.service... Sep 10 00:52:07.868367 lvm[1061]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 10 00:52:07.888732 systemd[1]: Finished lvm2-activation-early.service. Sep 10 00:52:07.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.889851 systemd[1]: Reached target cryptsetup.target. Sep 10 00:52:07.891625 systemd[1]: Starting lvm2-activation.service... Sep 10 00:52:07.894695 lvm[1062]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 10 00:52:07.917774 systemd[1]: Finished lvm2-activation.service. Sep 10 00:52:07.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.918803 systemd[1]: Reached target local-fs-pre.target. Sep 10 00:52:07.919772 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 10 00:52:07.919798 systemd[1]: Reached target local-fs.target. Sep 10 00:52:07.920717 systemd[1]: Reached target machines.target. Sep 10 00:52:07.922462 systemd[1]: Starting ldconfig.service... Sep 10 00:52:07.923470 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 10 00:52:07.923510 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 10 00:52:07.924453 systemd[1]: Starting systemd-boot-update.service... Sep 10 00:52:07.926322 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 10 00:52:07.928623 systemd[1]: Starting systemd-machine-id-commit.service... Sep 10 00:52:07.930595 systemd[1]: Starting systemd-sysext.service... Sep 10 00:52:07.931983 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1064 (bootctl) Sep 10 00:52:07.933098 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 10 00:52:07.934652 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 10 00:52:07.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.940451 systemd[1]: Unmounting usr-share-oem.mount... Sep 10 00:52:07.943288 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 10 00:52:07.943436 systemd[1]: Unmounted usr-share-oem.mount. Sep 10 00:52:07.957191 kernel: loop0: detected capacity change from 0 to 221472 Sep 10 00:52:07.978491 systemd-fsck[1072]: fsck.fat 4.2 (2021-01-31) Sep 10 00:52:07.978491 systemd-fsck[1072]: /dev/vda1: 791 files, 120785/258078 clusters Sep 10 00:52:07.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:07.980604 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 10 00:52:07.984333 systemd[1]: Mounting boot.mount... Sep 10 00:52:08.194176 systemd[1]: Mounted boot.mount. Sep 10 00:52:08.203173 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 10 00:52:08.205407 systemd[1]: Finished systemd-boot-update.service. Sep 10 00:52:08.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.215166 kernel: loop1: detected capacity change from 0 to 221472 Sep 10 00:52:08.266847 (sd-sysext)[1077]: Using extensions 'kubernetes'. Sep 10 00:52:08.267203 (sd-sysext)[1077]: Merged extensions into '/usr'. Sep 10 00:52:08.281420 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.282620 systemd[1]: Mounting usr-share-oem.mount... Sep 10 00:52:08.284096 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.285163 systemd[1]: Starting modprobe@dm_mod.service... Sep 10 00:52:08.287365 systemd[1]: Starting modprobe@efi_pstore.service... Sep 10 00:52:08.289513 systemd[1]: Starting modprobe@loop.service... Sep 10 00:52:08.290488 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.290590 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 10 00:52:08.290677 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.292916 systemd[1]: Mounted usr-share-oem.mount. Sep 10 00:52:08.294193 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 10 00:52:08.294290 systemd[1]: Finished modprobe@dm_mod.service. Sep 10 00:52:08.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.295780 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 10 00:52:08.295872 systemd[1]: Finished modprobe@efi_pstore.service. Sep 10 00:52:08.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.297322 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 10 00:52:08.297442 systemd[1]: Finished modprobe@loop.service. Sep 10 00:52:08.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.298868 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 10 00:52:08.298955 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.299742 systemd[1]: Finished systemd-sysext.service. Sep 10 00:52:08.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.301752 systemd[1]: Starting ensure-sysext.service... Sep 10 00:52:08.303348 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 10 00:52:08.307802 systemd[1]: Reloading. Sep 10 00:52:08.310841 ldconfig[1063]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 10 00:52:08.314059 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 10 00:52:08.315972 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 10 00:52:08.321673 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 10 00:52:08.362742 /usr/lib/systemd/system-generators/torcx-generator[1104]: time="2025-09-10T00:52:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 10 00:52:08.363117 /usr/lib/systemd/system-generators/torcx-generator[1104]: time="2025-09-10T00:52:08Z" level=info msg="torcx already run" Sep 10 00:52:08.432373 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 10 00:52:08.432394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 10 00:52:08.451210 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 10 00:52:08.508109 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 10 00:52:08.510000 audit: BPF prog-id=27 op=LOAD Sep 10 00:52:08.510000 audit: BPF prog-id=23 op=UNLOAD Sep 10 00:52:08.510000 audit: BPF prog-id=28 op=LOAD Sep 10 00:52:08.510000 audit: BPF prog-id=24 op=UNLOAD Sep 10 00:52:08.510000 audit: BPF prog-id=29 op=LOAD Sep 10 00:52:08.510000 audit: BPF prog-id=30 op=LOAD Sep 10 00:52:08.510000 audit: BPF prog-id=25 op=UNLOAD Sep 10 00:52:08.510000 audit: BPF prog-id=26 op=UNLOAD Sep 10 00:52:08.512000 audit: BPF prog-id=31 op=LOAD Sep 10 00:52:08.512000 audit: BPF prog-id=18 op=UNLOAD Sep 10 00:52:08.513000 audit: BPF prog-id=32 op=LOAD Sep 10 00:52:08.513000 audit: BPF prog-id=33 op=LOAD Sep 10 00:52:08.513000 audit: BPF prog-id=19 op=UNLOAD Sep 10 00:52:08.515000 audit: BPF prog-id=20 op=UNLOAD Sep 10 00:52:08.517000 audit: BPF prog-id=34 op=LOAD Sep 10 00:52:08.517000 audit: BPF prog-id=35 op=LOAD Sep 10 00:52:08.517000 audit: BPF prog-id=21 op=UNLOAD Sep 10 00:52:08.517000 audit: BPF prog-id=22 op=UNLOAD Sep 10 00:52:08.520571 systemd[1]: Finished ldconfig.service. Sep 10 00:52:08.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.521868 systemd[1]: Finished systemd-machine-id-commit.service. Sep 10 00:52:08.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.523932 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 10 00:52:08.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.528599 systemd[1]: Starting audit-rules.service... Sep 10 00:52:08.530609 systemd[1]: Starting clean-ca-certificates.service... Sep 10 00:52:08.532510 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 10 00:52:08.534000 audit: BPF prog-id=36 op=LOAD Sep 10 00:52:08.535012 systemd[1]: Starting systemd-resolved.service... Sep 10 00:52:08.536000 audit: BPF prog-id=37 op=LOAD Sep 10 00:52:08.537765 systemd[1]: Starting systemd-timesyncd.service... Sep 10 00:52:08.539816 systemd[1]: Starting systemd-update-utmp.service... Sep 10 00:52:08.541373 systemd[1]: Finished clean-ca-certificates.service. Sep 10 00:52:08.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.544000 audit[1158]: SYSTEM_BOOT pid=1158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.546806 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 10 00:52:08.548989 systemd[1]: Finished systemd-update-utmp.service. Sep 10 00:52:08.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.551129 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.551390 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.552744 systemd[1]: Starting modprobe@dm_mod.service... Sep 10 00:52:08.554589 systemd[1]: Starting modprobe@efi_pstore.service... Sep 10 00:52:08.556438 systemd[1]: Starting modprobe@loop.service... Sep 10 00:52:08.557355 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.557523 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 10 00:52:08.557671 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 10 00:52:08.557775 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.558924 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 10 00:52:08.559062 systemd[1]: Finished modprobe@dm_mod.service. Sep 10 00:52:08.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.560534 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 10 00:52:08.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.562006 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 10 00:52:08.562121 systemd[1]: Finished modprobe@efi_pstore.service. Sep 10 00:52:08.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.563469 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 10 00:52:08.563591 systemd[1]: Finished modprobe@loop.service. Sep 10 00:52:08.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.564913 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 10 00:52:08.565041 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.566786 systemd[1]: Starting systemd-update-done.service... Sep 10 00:52:08.569448 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.569664 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.571370 systemd[1]: Starting modprobe@dm_mod.service... Sep 10 00:52:08.573224 systemd[1]: Starting modprobe@efi_pstore.service... Sep 10 00:52:08.575005 systemd[1]: Starting modprobe@loop.service... Sep 10 00:52:08.575822 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.575953 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 10 00:52:08.576067 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 10 00:52:08.576172 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.577445 systemd[1]: Finished systemd-update-done.service. Sep 10 00:52:08.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.578761 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 10 00:52:08.578883 systemd[1]: Finished modprobe@dm_mod.service. Sep 10 00:52:08.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:08.580332 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 10 00:52:08.580454 systemd[1]: Finished modprobe@efi_pstore.service. Sep 10 00:52:08.580000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 10 00:52:08.580000 audit[1174]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcfaa8c5e0 a2=420 a3=0 items=0 ppid=1147 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:08.580000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 10 00:52:08.581184 augenrules[1174]: No rules Sep 10 00:52:08.581823 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 10 00:52:08.581944 systemd[1]: Finished modprobe@loop.service. Sep 10 00:52:08.583188 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 10 00:52:08.583309 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.587087 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.587380 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.588824 systemd[1]: Starting modprobe@dm_mod.service... Sep 10 00:52:08.590614 systemd[1]: Starting modprobe@drm.service... Sep 10 00:52:08.592615 systemd[1]: Starting modprobe@efi_pstore.service... Sep 10 00:52:08.594462 systemd[1]: Starting modprobe@loop.service... Sep 10 00:52:08.595453 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.595592 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 10 00:52:08.596518 systemd-resolved[1151]: Positive Trust Anchors: Sep 10 00:52:08.596527 systemd-resolved[1151]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 10 00:52:08.596552 systemd-resolved[1151]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 10 00:52:08.597038 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 10 00:52:08.598248 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 10 00:52:08.598399 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 10 00:52:08.599984 systemd[1]: Finished audit-rules.service. Sep 10 00:52:08.601314 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 10 00:52:08.601455 systemd[1]: Finished modprobe@dm_mod.service. Sep 10 00:52:08.602795 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 10 00:52:08.602919 systemd[1]: Finished modprobe@drm.service. Sep 10 00:52:08.603824 systemd-resolved[1151]: Defaulting to hostname 'linux'. Sep 10 00:52:08.604210 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 10 00:52:08.604345 systemd[1]: Finished modprobe@efi_pstore.service. Sep 10 00:52:08.605516 systemd[1]: Started systemd-resolved.service. Sep 10 00:52:08.606716 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 10 00:52:08.606813 systemd[1]: Finished modprobe@loop.service. Sep 10 00:52:08.608009 systemd[1]: Reached target network.target. Sep 10 00:52:08.608872 systemd[1]: Reached target nss-lookup.target. Sep 10 00:52:08.609766 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 10 00:52:08.609805 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 10 00:52:08.610070 systemd[1]: Finished ensure-sysext.service. Sep 10 00:52:08.624474 systemd[1]: Started systemd-timesyncd.service. Sep 10 00:52:08.625655 systemd[1]: Reached target sysinit.target. Sep 10 00:52:09.253104 systemd-timesyncd[1157]: Contacted time server 10.0.0.1:123 (10.0.0.1). Sep 10 00:52:09.253128 systemd-resolved[1151]: Clock change detected. Flushing caches. Sep 10 00:52:09.253369 systemd-timesyncd[1157]: Initial clock synchronization to Wed 2025-09-10 00:52:09.253048 UTC. Sep 10 00:52:09.253982 systemd[1]: Started motdgen.path. Sep 10 00:52:09.254789 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 10 00:52:09.255931 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 10 00:52:09.256851 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 10 00:52:09.256879 systemd[1]: Reached target paths.target. Sep 10 00:52:09.257714 systemd[1]: Reached target time-set.target. Sep 10 00:52:09.258685 systemd[1]: Started logrotate.timer. Sep 10 00:52:09.259546 systemd[1]: Started mdadm.timer. Sep 10 00:52:09.260277 systemd[1]: Reached target timers.target. Sep 10 00:52:09.261356 systemd[1]: Listening on dbus.socket. Sep 10 00:52:09.262913 systemd[1]: Starting docker.socket... Sep 10 00:52:09.265282 systemd[1]: Listening on sshd.socket. Sep 10 00:52:09.266204 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 10 00:52:09.266583 systemd[1]: Listening on docker.socket. Sep 10 00:52:09.267546 systemd[1]: Reached target sockets.target. Sep 10 00:52:09.268364 systemd[1]: Reached target basic.target. Sep 10 00:52:09.269311 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 10 00:52:09.269339 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 10 00:52:09.270066 systemd[1]: Starting containerd.service... Sep 10 00:52:09.271659 systemd[1]: Starting dbus.service... Sep 10 00:52:09.273367 systemd[1]: Starting enable-oem-cloudinit.service... Sep 10 00:52:09.275420 systemd[1]: Starting extend-filesystems.service... Sep 10 00:52:09.276364 jq[1189]: false Sep 10 00:52:09.276593 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 10 00:52:09.277578 systemd[1]: Starting motdgen.service... Sep 10 00:52:09.279525 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 10 00:52:09.281820 systemd[1]: Starting sshd-keygen.service... Sep 10 00:52:09.286489 extend-filesystems[1190]: Found loop1 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found sr0 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda1 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda2 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda3 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found usr Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda4 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda6 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda7 Sep 10 00:52:09.286489 extend-filesystems[1190]: Found vda9 Sep 10 00:52:09.297970 extend-filesystems[1190]: Checking size of /dev/vda9 Sep 10 00:52:09.297595 dbus-daemon[1188]: [system] SELinux support is enabled Sep 10 00:52:09.296374 systemd[1]: Starting systemd-logind.service... Sep 10 00:52:09.297995 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 10 00:52:09.299093 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 10 00:52:09.299647 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 10 00:52:09.300366 systemd[1]: Starting update-engine.service... Sep 10 00:52:09.302328 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 10 00:52:09.304079 systemd[1]: Started dbus.service. Sep 10 00:52:09.304442 jq[1209]: true Sep 10 00:52:09.308230 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 10 00:52:09.308401 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 10 00:52:09.308733 systemd[1]: motdgen.service: Deactivated successfully. Sep 10 00:52:09.308883 systemd[1]: Finished motdgen.service. Sep 10 00:52:09.310163 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 10 00:52:09.310313 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 10 00:52:09.313317 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 10 00:52:09.313347 systemd[1]: Reached target system-config.target. Sep 10 00:52:09.315953 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 10 00:52:09.316902 jq[1211]: true Sep 10 00:52:09.315981 systemd[1]: Reached target user-config.target. Sep 10 00:52:09.334598 env[1212]: time="2025-09-10T00:52:09.334489805Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 10 00:52:09.335626 update_engine[1208]: I0910 00:52:09.335280 1208 main.cc:92] Flatcar Update Engine starting Sep 10 00:52:09.336988 systemd[1]: Started update-engine.service. Sep 10 00:52:09.337185 update_engine[1208]: I0910 00:52:09.337049 1208 update_check_scheduler.cc:74] Next update check in 4m8s Sep 10 00:52:09.337558 systemd-logind[1207]: Watching system buttons on /dev/input/event1 (Power Button) Sep 10 00:52:09.337580 systemd-logind[1207]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 10 00:52:09.339772 systemd-logind[1207]: New seat seat0. Sep 10 00:52:09.341567 systemd[1]: Started locksmithd.service. Sep 10 00:52:09.347484 systemd[1]: Started systemd-logind.service. Sep 10 00:52:09.356453 env[1212]: time="2025-09-10T00:52:09.356402830Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 10 00:52:09.356567 env[1212]: time="2025-09-10T00:52:09.356556118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 10 00:52:09.357641 env[1212]: time="2025-09-10T00:52:09.357608221Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.191-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 10 00:52:09.357693 env[1212]: time="2025-09-10T00:52:09.357641874Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 10 00:52:09.358100 env[1212]: time="2025-09-10T00:52:09.358077290Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 10 00:52:09.358165 env[1212]: time="2025-09-10T00:52:09.358099863Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 10 00:52:09.358165 env[1212]: time="2025-09-10T00:52:09.358114340Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 10 00:52:09.358165 env[1212]: time="2025-09-10T00:52:09.358125861Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 10 00:52:09.358222 env[1212]: time="2025-09-10T00:52:09.358195712Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 10 00:52:09.358444 env[1212]: time="2025-09-10T00:52:09.358416156Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 10 00:52:09.358586 env[1212]: time="2025-09-10T00:52:09.358563622Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 10 00:52:09.358586 env[1212]: time="2025-09-10T00:52:09.358584301Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 10 00:52:09.358644 env[1212]: time="2025-09-10T00:52:09.358632962Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 10 00:52:09.358684 env[1212]: time="2025-09-10T00:52:09.358645766Z" level=info msg="metadata content store policy set" policy=shared Sep 10 00:52:09.368050 extend-filesystems[1190]: Resized partition /dev/vda9 Sep 10 00:52:09.463153 locksmithd[1234]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 10 00:52:09.463685 extend-filesystems[1245]: resize2fs 1.46.5 (30-Dec-2021) Sep 10 00:52:09.492523 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Sep 10 00:52:09.710534 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Sep 10 00:52:09.851962 extend-filesystems[1245]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 10 00:52:09.851962 extend-filesystems[1245]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 10 00:52:09.851962 extend-filesystems[1245]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Sep 10 00:52:09.865969 extend-filesystems[1190]: Resized filesystem in /dev/vda9 Sep 10 00:52:09.867797 bash[1233]: Updated "/home/core/.ssh/authorized_keys" Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853820586Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853855942Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853871081Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853902179Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853919021Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853930582Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853941162Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853953105Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853967692Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853982660Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.853993049Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.854003449Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.854100501Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 10 00:52:09.867880 env[1212]: time="2025-09-10T00:52:09.854164721Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 10 00:52:09.854702 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854426773Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854455817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854468060Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854716406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854737646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854753145Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854767041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854781177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854795685Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854809290Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854821954Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854837533Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854939985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854956837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.868371 env[1212]: time="2025-09-10T00:52:09.854972356Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.854904 systemd[1]: Finished extend-filesystems.service. Sep 10 00:52:09.868711 env[1212]: time="2025-09-10T00:52:09.854986513Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 10 00:52:09.868711 env[1212]: time="2025-09-10T00:52:09.855003875Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 10 00:52:09.868711 env[1212]: time="2025-09-10T00:52:09.855018122Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 10 00:52:09.868711 env[1212]: time="2025-09-10T00:52:09.855041466Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 10 00:52:09.868711 env[1212]: time="2025-09-10T00:52:09.855076050Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 10 00:52:09.865108 systemd[1]: Started containerd.service. Sep 10 00:52:09.866385 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.855273771Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.855322483Z" level=info msg="Connect containerd service" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.855662019Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856243780Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856387049Z" level=info msg="Start subscribing containerd event" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856443315Z" level=info msg="Start recovering state" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856544695Z" level=info msg="Start event monitor" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856570663Z" level=info msg="Start snapshots syncer" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856582375Z" level=info msg="Start cni network conf syncer for default" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856584489Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856592154Z" level=info msg="Start streaming server" Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856616409Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 10 00:52:09.868867 env[1212]: time="2025-09-10T00:52:09.856679828Z" level=info msg="containerd successfully booted in 0.522946s" Sep 10 00:52:10.291683 systemd-networkd[1034]: eth0: Gained IPv6LL Sep 10 00:52:10.293369 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 10 00:52:10.294774 systemd[1]: Reached target network-online.target. Sep 10 00:52:10.297093 systemd[1]: Starting kubelet.service... Sep 10 00:52:10.436757 sshd_keygen[1206]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 10 00:52:10.455348 systemd[1]: Finished sshd-keygen.service. Sep 10 00:52:10.457694 systemd[1]: Starting issuegen.service... Sep 10 00:52:10.462848 systemd[1]: issuegen.service: Deactivated successfully. Sep 10 00:52:10.462962 systemd[1]: Finished issuegen.service. Sep 10 00:52:10.464823 systemd[1]: Starting systemd-user-sessions.service... Sep 10 00:52:10.469602 systemd[1]: Finished systemd-user-sessions.service. Sep 10 00:52:10.471730 systemd[1]: Started getty@tty1.service. Sep 10 00:52:10.473463 systemd[1]: Started serial-getty@ttyS0.service. Sep 10 00:52:10.474605 systemd[1]: Reached target getty.target. Sep 10 00:52:10.943375 systemd[1]: Started kubelet.service. Sep 10 00:52:10.944458 systemd[1]: Reached target multi-user.target. Sep 10 00:52:10.946188 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 10 00:52:10.952447 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 10 00:52:10.952589 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 10 00:52:10.953746 systemd[1]: Startup finished in 633ms (kernel) + 4.074s (initrd) + 5.555s (userspace) = 10.263s. Sep 10 00:52:11.326119 kubelet[1266]: E0910 00:52:11.326004 1266 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 10 00:52:11.327366 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 10 00:52:11.327471 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 10 00:52:13.896239 systemd[1]: Created slice system-sshd.slice. Sep 10 00:52:13.897153 systemd[1]: Started sshd@0-10.0.0.143:22-10.0.0.1:33050.service. Sep 10 00:52:13.939187 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 33050 ssh2: RSA SHA256:naKAIq1jxVWXXwxrf2qyS4Axg4ReIMCTV7B/o3rV64U Sep 10 00:52:13.940630 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:13.947815 systemd-logind[1207]: New session 1 of user core. Sep 10 00:52:13.948827 systemd[1]: Created slice user-500.slice. Sep 10 00:52:13.949753 systemd[1]: Starting user-runtime-dir@500.service... Sep 10 00:52:13.956788 systemd[1]: Finished user-runtime-dir@500.service. Sep 10 00:52:13.957796 systemd[1]: Starting user@500.service... Sep 10 00:52:13.960033 (systemd)[1278]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:14.021577 systemd[1278]: Queued start job for default target default.target. Sep 10 00:52:14.022009 systemd[1278]: Reached target paths.target. Sep 10 00:52:14.022032 systemd[1278]: Reached target sockets.target. Sep 10 00:52:14.022049 systemd[1278]: Reached target timers.target. Sep 10 00:52:14.022064 systemd[1278]: Reached target basic.target. Sep 10 00:52:14.022111 systemd[1278]: Reached target default.target. Sep 10 00:52:14.022139 systemd[1278]: Startup finished in 57ms. Sep 10 00:52:14.022238 systemd[1]: Started user@500.service. Sep 10 00:52:14.023020 systemd[1]: Started session-1.scope. Sep 10 00:52:14.071156 systemd[1]: Started sshd@1-10.0.0.143:22-10.0.0.1:33066.service. Sep 10 00:52:14.112725 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 33066 ssh2: RSA SHA256:naKAIq1jxVWXXwxrf2qyS4Axg4ReIMCTV7B/o3rV64U Sep 10 00:52:14.113590 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:14.116492 systemd-logind[1207]: New session 2 of user core. Sep 10 00:52:14.117595 systemd[1]: Started session-2.scope. Sep 10 00:52:14.167960 sshd[1287]: pam_unix(sshd:session): session closed for user core Sep 10 00:52:14.170722 systemd[1]: sshd@1-10.0.0.143:22-10.0.0.1:33066.service: Deactivated successfully. Sep 10 00:52:14.171227 systemd[1]: session-2.scope: Deactivated successfully. Sep 10 00:52:14.171700 systemd-logind[1207]: Session 2 logged out. Waiting for processes to exit. Sep 10 00:52:14.172661 systemd[1]: Started sshd@2-10.0.0.143:22-10.0.0.1:33068.service. Sep 10 00:52:14.173288 systemd-logind[1207]: Removed session 2. Sep 10 00:52:14.211907 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 33068 ssh2: RSA SHA256:naKAIq1jxVWXXwxrf2qyS4Axg4ReIMCTV7B/o3rV64U Sep 10 00:52:14.212708 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:14.215366 systemd-logind[1207]: New session 3 of user core. Sep 10 00:52:14.216131 systemd[1]: Started session-3.scope. Sep 10 00:52:14.263067 sshd[1293]: pam_unix(sshd:session): session closed for user core Sep 10 00:52:14.265434 systemd[1]: sshd@2-10.0.0.143:22-10.0.0.1:33068.service: Deactivated successfully. Sep 10 00:52:14.265937 systemd[1]: session-3.scope: Deactivated successfully. Sep 10 00:52:14.266375 systemd-logind[1207]: Session 3 logged out. Waiting for processes to exit. Sep 10 00:52:14.267374 systemd[1]: Started sshd@3-10.0.0.143:22-10.0.0.1:33076.service. Sep 10 00:52:14.268223 systemd-logind[1207]: Removed session 3. Sep 10 00:52:14.306819 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 33076 ssh2: RSA SHA256:naKAIq1jxVWXXwxrf2qyS4Axg4ReIMCTV7B/o3rV64U Sep 10 00:52:14.307605 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:14.310505 systemd-logind[1207]: New session 4 of user core. Sep 10 00:52:14.311225 systemd[1]: Started session-4.scope. Sep 10 00:52:14.361238 sshd[1299]: pam_unix(sshd:session): session closed for user core Sep 10 00:52:14.363651 systemd[1]: sshd@3-10.0.0.143:22-10.0.0.1:33076.service: Deactivated successfully. Sep 10 00:52:14.364093 systemd[1]: session-4.scope: Deactivated successfully. Sep 10 00:52:14.364479 systemd-logind[1207]: Session 4 logged out. Waiting for processes to exit. Sep 10 00:52:14.365277 systemd[1]: Started sshd@4-10.0.0.143:22-10.0.0.1:33082.service. Sep 10 00:52:14.366075 systemd-logind[1207]: Removed session 4. Sep 10 00:52:14.404786 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 33082 ssh2: RSA SHA256:naKAIq1jxVWXXwxrf2qyS4Axg4ReIMCTV7B/o3rV64U Sep 10 00:52:14.405638 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:14.408382 systemd-logind[1207]: New session 5 of user core. Sep 10 00:52:14.409178 systemd[1]: Started session-5.scope. Sep 10 00:52:14.463556 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 10 00:52:14.463767 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 10 00:52:14.470691 dbus-daemon[1188]: Э\u001d\x9e@V: received setenforce notice (enforcing=1037623936) Sep 10 00:52:14.472722 sudo[1309]: pam_unix(sudo:session): session closed for user root Sep 10 00:52:14.474213 sshd[1306]: pam_unix(sshd:session): session closed for user core Sep 10 00:52:14.476967 systemd[1]: sshd@4-10.0.0.143:22-10.0.0.1:33082.service: Deactivated successfully. Sep 10 00:52:14.477454 systemd[1]: session-5.scope: Deactivated successfully. Sep 10 00:52:14.477985 systemd-logind[1207]: Session 5 logged out. Waiting for processes to exit. Sep 10 00:52:14.478939 systemd[1]: Started sshd@5-10.0.0.143:22-10.0.0.1:33096.service. Sep 10 00:52:14.479711 systemd-logind[1207]: Removed session 5. Sep 10 00:52:14.519071 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 33096 ssh2: RSA SHA256:naKAIq1jxVWXXwxrf2qyS4Axg4ReIMCTV7B/o3rV64U Sep 10 00:52:14.520033 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:14.522947 systemd-logind[1207]: New session 6 of user core. Sep 10 00:52:14.523786 systemd[1]: Started session-6.scope. Sep 10 00:52:14.575540 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 10 00:52:14.575731 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 10 00:52:14.577922 sudo[1317]: pam_unix(sudo:session): session closed for user root Sep 10 00:52:14.582249 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 10 00:52:14.582486 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 10 00:52:14.590408 systemd[1]: Stopping audit-rules.service... Sep 10 00:52:14.590000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 10 00:52:14.591560 auditctl[1320]: No rules Sep 10 00:52:14.591801 systemd[1]: audit-rules.service: Deactivated successfully. Sep 10 00:52:14.591919 systemd[1]: Stopped audit-rules.service. Sep 10 00:52:14.592339 kernel: kauditd_printk_skb: 221 callbacks suppressed Sep 10 00:52:14.592378 kernel: audit: type=1305 audit(1757465534.590:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 10 00:52:14.590000 audit[1320]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4a8078b0 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:14.593074 systemd[1]: Starting audit-rules.service... Sep 10 00:52:14.598389 kernel: audit: type=1300 audit(1757465534.590:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4a8078b0 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:14.590000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 10 00:52:14.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.602720 kernel: audit: type=1327 audit(1757465534.590:198): proctitle=2F7362696E2F617564697463746C002D44 Sep 10 00:52:14.602760 kernel: audit: type=1131 audit(1757465534.590:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.607210 augenrules[1337]: No rules Sep 10 00:52:14.607846 systemd[1]: Finished audit-rules.service. Sep 10 00:52:14.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.608780 sudo[1316]: pam_unix(sudo:session): session closed for user root Sep 10 00:52:14.610061 sshd[1313]: pam_unix(sshd:session): session closed for user core Sep 10 00:52:14.608000 audit[1316]: USER_END pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.612385 systemd[1]: sshd@5-10.0.0.143:22-10.0.0.1:33096.service: Deactivated successfully. Sep 10 00:52:14.613000 systemd[1]: session-6.scope: Deactivated successfully. Sep 10 00:52:14.613549 systemd-logind[1207]: Session 6 logged out. Waiting for processes to exit. Sep 10 00:52:14.614448 systemd[1]: Started sshd@6-10.0.0.143:22-10.0.0.1:33112.service. Sep 10 00:52:14.615154 kernel: audit: type=1130 audit(1757465534.607:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.615211 kernel: audit: type=1106 audit(1757465534.608:201): pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.615237 kernel: audit: type=1104 audit(1757465534.608:202): pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.608000 audit[1316]: CRED_DISP pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.615321 systemd-logind[1207]: Removed session 6. Sep 10 00:52:14.608000 audit[1313]: USER_END pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.622286 kernel: audit: type=1106 audit(1757465534.608:203): pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.622332 kernel: audit: type=1104 audit(1757465534.608:204): pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.608000 audit[1313]: CRED_DISP pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.625543 kernel: audit: type=1131 audit(1757465534.611:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:33096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:33096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:33112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.654000 audit[1343]: USER_ACCT pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.654835 sshd[1343]: Accepted publickey for core from 10.0.0.1 port 33112 ssh2: RSA SHA256:naKAIq1jxVWXXwxrf2qyS4Axg4ReIMCTV7B/o3rV64U Sep 10 00:52:14.654000 audit[1343]: CRED_ACQ pid=1343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.654000 audit[1343]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff148649b0 a2=3 a3=0 items=0 ppid=1 pid=1343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:14.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 10 00:52:14.655796 sshd[1343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 10 00:52:14.658752 systemd-logind[1207]: New session 7 of user core. Sep 10 00:52:14.659627 systemd[1]: Started session-7.scope. Sep 10 00:52:14.662000 audit[1343]: USER_START pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.663000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:14.709000 audit[1346]: USER_ACCT pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.709000 audit[1346]: CRED_REFR pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.709955 sudo[1346]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 10 00:52:14.710125 sudo[1346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 10 00:52:14.711000 audit[1346]: USER_START pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.721273 systemd[1]: Starting coreos-metadata.service... Sep 10 00:52:14.728200 systemd[1]: coreos-metadata.service: Deactivated successfully. Sep 10 00:52:14.728360 systemd[1]: Finished coreos-metadata.service. Sep 10 00:52:14.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:14.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:15.141032 systemd[1]: Stopped kubelet.service. Sep 10 00:52:15.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:15.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:15.143070 systemd[1]: Starting kubelet.service... Sep 10 00:52:15.163339 systemd[1]: Reloading. Sep 10 00:52:15.226832 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-09-10T00:52:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 10 00:52:15.226860 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-09-10T00:52:15Z" level=info msg="torcx already run" Sep 10 00:52:15.569462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 10 00:52:15.569477 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 10 00:52:15.586082 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit: BPF prog-id=43 op=LOAD Sep 10 00:52:15.642000 audit: BPF prog-id=36 op=UNLOAD Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit: BPF prog-id=44 op=LOAD Sep 10 00:52:15.643000 audit: BPF prog-id=27 op=UNLOAD Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit: BPF prog-id=45 op=LOAD Sep 10 00:52:15.643000 audit: BPF prog-id=28 op=UNLOAD Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit: BPF prog-id=46 op=LOAD Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.643000 audit: BPF prog-id=47 op=LOAD Sep 10 00:52:15.643000 audit: BPF prog-id=29 op=UNLOAD Sep 10 00:52:15.643000 audit: BPF prog-id=30 op=UNLOAD Sep 10 00:52:15.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.645000 audit: BPF prog-id=48 op=LOAD Sep 10 00:52:15.645000 audit: BPF prog-id=41 op=UNLOAD Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit: BPF prog-id=49 op=LOAD Sep 10 00:52:15.646000 audit: BPF prog-id=38 op=UNLOAD Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit: BPF prog-id=50 op=LOAD Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.646000 audit: BPF prog-id=51 op=LOAD Sep 10 00:52:15.646000 audit: BPF prog-id=39 op=UNLOAD Sep 10 00:52:15.646000 audit: BPF prog-id=40 op=UNLOAD Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit: BPF prog-id=52 op=LOAD Sep 10 00:52:15.647000 audit: BPF prog-id=31 op=UNLOAD Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit: BPF prog-id=53 op=LOAD Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit: BPF prog-id=54 op=LOAD Sep 10 00:52:15.647000 audit: BPF prog-id=32 op=UNLOAD Sep 10 00:52:15.647000 audit: BPF prog-id=33 op=UNLOAD Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.647000 audit: BPF prog-id=55 op=LOAD Sep 10 00:52:15.647000 audit: BPF prog-id=37 op=UNLOAD Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit: BPF prog-id=56 op=LOAD Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:15.649000 audit: BPF prog-id=57 op=LOAD Sep 10 00:52:15.649000 audit: BPF prog-id=34 op=UNLOAD Sep 10 00:52:15.649000 audit: BPF prog-id=35 op=UNLOAD Sep 10 00:52:15.658662 systemd[1]: Started kubelet.service. Sep 10 00:52:15.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:15.660024 systemd[1]: Stopping kubelet.service... Sep 10 00:52:15.660242 systemd[1]: kubelet.service: Deactivated successfully. Sep 10 00:52:15.660382 systemd[1]: Stopped kubelet.service. Sep 10 00:52:15.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:15.661671 systemd[1]: Starting kubelet.service... Sep 10 00:52:15.744243 systemd[1]: Started kubelet.service. Sep 10 00:52:15.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:15.778022 kubelet[1452]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 10 00:52:15.778389 kubelet[1452]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 10 00:52:15.778389 kubelet[1452]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 10 00:52:15.778552 kubelet[1452]: I0910 00:52:15.778521 1452 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 10 00:52:16.195152 kubelet[1452]: I0910 00:52:16.195101 1452 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 10 00:52:16.195152 kubelet[1452]: I0910 00:52:16.195138 1452 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 10 00:52:16.195433 kubelet[1452]: I0910 00:52:16.195411 1452 server.go:934] "Client rotation is on, will bootstrap in background" Sep 10 00:52:16.213931 kubelet[1452]: I0910 00:52:16.213900 1452 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 10 00:52:16.220414 kubelet[1452]: E0910 00:52:16.220391 1452 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 10 00:52:16.220531 kubelet[1452]: I0910 00:52:16.220508 1452 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 10 00:52:16.224843 kubelet[1452]: I0910 00:52:16.224825 1452 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 10 00:52:16.225597 kubelet[1452]: I0910 00:52:16.225577 1452 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 10 00:52:16.225758 kubelet[1452]: I0910 00:52:16.225708 1452 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 10 00:52:16.225931 kubelet[1452]: I0910 00:52:16.225744 1452 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.143","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 10 00:52:16.226018 kubelet[1452]: I0910 00:52:16.225940 1452 topology_manager.go:138] "Creating topology manager with none policy" Sep 10 00:52:16.226018 kubelet[1452]: I0910 00:52:16.225951 1452 container_manager_linux.go:300] "Creating device plugin manager" Sep 10 00:52:16.226062 kubelet[1452]: I0910 00:52:16.226042 1452 state_mem.go:36] "Initialized new in-memory state store" Sep 10 00:52:16.235675 kubelet[1452]: I0910 00:52:16.235644 1452 kubelet.go:408] "Attempting to sync node with API server" Sep 10 00:52:16.235675 kubelet[1452]: I0910 00:52:16.235667 1452 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 10 00:52:16.235739 kubelet[1452]: I0910 00:52:16.235696 1452 kubelet.go:314] "Adding apiserver pod source" Sep 10 00:52:16.235739 kubelet[1452]: I0910 00:52:16.235708 1452 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 10 00:52:16.235847 kubelet[1452]: E0910 00:52:16.235818 1452 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:16.235917 kubelet[1452]: E0910 00:52:16.235891 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:16.238445 kubelet[1452]: W0910 00:52:16.238420 1452 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.143" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 10 00:52:16.238531 kubelet[1452]: E0910 00:52:16.238450 1452 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.143\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 10 00:52:16.238669 kubelet[1452]: I0910 00:52:16.238640 1452 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 10 00:52:16.239017 kubelet[1452]: I0910 00:52:16.238993 1452 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 10 00:52:16.239510 kubelet[1452]: W0910 00:52:16.239457 1452 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 10 00:52:16.241934 kubelet[1452]: W0910 00:52:16.241906 1452 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 10 00:52:16.241934 kubelet[1452]: E0910 00:52:16.241930 1452 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 10 00:52:16.245657 kubelet[1452]: I0910 00:52:16.245630 1452 server.go:1274] "Started kubelet" Sep 10 00:52:16.246000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:16.246000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 10 00:52:16.246000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b273b0 a1=c000a24ea0 a2=c000b27380 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.246000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 10 00:52:16.246000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:16.246000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 10 00:52:16.246000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000430c00 a1=c000a24eb8 a2=c000b27440 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.246000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 10 00:52:16.246939 kubelet[1452]: I0910 00:52:16.246640 1452 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 10 00:52:16.246939 kubelet[1452]: I0910 00:52:16.246684 1452 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 10 00:52:16.246939 kubelet[1452]: I0910 00:52:16.246729 1452 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 10 00:52:16.252791 kubelet[1452]: I0910 00:52:16.252747 1452 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 10 00:52:16.253709 kubelet[1452]: I0910 00:52:16.253557 1452 server.go:449] "Adding debug handlers to kubelet server" Sep 10 00:52:16.255169 kubelet[1452]: I0910 00:52:16.254543 1452 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 10 00:52:16.255788 kubelet[1452]: E0910 00:52:16.255767 1452 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 10 00:52:16.255976 kubelet[1452]: I0910 00:52:16.255953 1452 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 10 00:52:16.256052 kubelet[1452]: I0910 00:52:16.256026 1452 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 10 00:52:16.256087 kubelet[1452]: I0910 00:52:16.256073 1452 reconciler.go:26] "Reconciler: start to sync state" Sep 10 00:52:16.256242 kubelet[1452]: I0910 00:52:16.256219 1452 factory.go:221] Registration of the systemd container factory successfully Sep 10 00:52:16.256315 kubelet[1452]: I0910 00:52:16.256290 1452 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 10 00:52:16.256444 kubelet[1452]: E0910 00:52:16.256422 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:16.257574 kubelet[1452]: I0910 00:52:16.257440 1452 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 10 00:52:16.258333 kubelet[1452]: I0910 00:52:16.258312 1452 factory.go:221] Registration of the containerd container factory successfully Sep 10 00:52:16.258774 kubelet[1452]: I0910 00:52:16.258636 1452 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 10 00:52:16.259442 kubelet[1452]: E0910 00:52:16.259418 1452 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.143\" not found" node="10.0.0.143" Sep 10 00:52:16.266073 kubelet[1452]: I0910 00:52:16.266053 1452 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 10 00:52:16.266073 kubelet[1452]: I0910 00:52:16.266068 1452 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 10 00:52:16.266137 kubelet[1452]: I0910 00:52:16.266080 1452 state_mem.go:36] "Initialized new in-memory state store" Sep 10 00:52:16.274000 audit[1467]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.274000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffffc2e1ff0 a2=0 a3=7ffffc2e1fdc items=0 ppid=1452 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 10 00:52:16.275000 audit[1472]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.275000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff1d94b3e0 a2=0 a3=7fff1d94b3cc items=0 ppid=1452 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 10 00:52:16.357126 kubelet[1452]: E0910 00:52:16.357089 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:16.457577 kubelet[1452]: E0910 00:52:16.457469 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:16.557802 kubelet[1452]: E0910 00:52:16.557781 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:16.638346 kubelet[1452]: I0910 00:52:16.638327 1452 policy_none.go:49] "None policy: Start" Sep 10 00:52:16.638971 kubelet[1452]: I0910 00:52:16.638954 1452 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 10 00:52:16.639015 kubelet[1452]: I0910 00:52:16.638979 1452 state_mem.go:35] "Initializing new in-memory state store" Sep 10 00:52:16.276000 audit[1474]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.276000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca4231aa0 a2=0 a3=7ffca4231a8c items=0 ppid=1452 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 10 00:52:16.641000 audit[1480]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.641000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6ba18460 a2=0 a3=7fff6ba1844c items=0 ppid=1452 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 10 00:52:16.646072 systemd[1]: Created slice kubepods.slice. Sep 10 00:52:16.649732 systemd[1]: Created slice kubepods-besteffort.slice. Sep 10 00:52:16.658559 kubelet[1452]: E0910 00:52:16.658053 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:16.658430 systemd[1]: Created slice kubepods-burstable.slice. Sep 10 00:52:16.659589 kubelet[1452]: I0910 00:52:16.659571 1452 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 10 00:52:16.659000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:16.659000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 10 00:52:16.659000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ebe720 a1=c000e93950 a2=c000ebe6f0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.659000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 10 00:52:16.659926 kubelet[1452]: I0910 00:52:16.659699 1452 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 10 00:52:16.659926 kubelet[1452]: I0910 00:52:16.659803 1452 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 10 00:52:16.659926 kubelet[1452]: I0910 00:52:16.659814 1452 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 10 00:52:16.662445 kubelet[1452]: I0910 00:52:16.662402 1452 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 10 00:52:16.664861 kubelet[1452]: E0910 00:52:16.664845 1452 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.143\" not found" Sep 10 00:52:16.675000 audit[1485]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.675000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca82fd070 a2=0 a3=7ffca82fd05c items=0 ppid=1452 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 10 00:52:16.676092 kubelet[1452]: I0910 00:52:16.676060 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 10 00:52:16.676000 audit[1487]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.676000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce5988560 a2=0 a3=7ffce598854c items=0 ppid=1452 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 10 00:52:16.676000 audit[1486]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:16.676000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb822a1a0 a2=0 a3=10e3 items=0 ppid=1452 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 10 00:52:16.677215 kubelet[1452]: I0910 00:52:16.677063 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 10 00:52:16.677215 kubelet[1452]: I0910 00:52:16.677078 1452 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 10 00:52:16.677215 kubelet[1452]: I0910 00:52:16.677093 1452 kubelet.go:2321] "Starting kubelet main sync loop" Sep 10 00:52:16.677215 kubelet[1452]: E0910 00:52:16.677196 1452 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 10 00:52:16.677000 audit[1488]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:16.677000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff5781640 a2=0 a3=7ffff578162c items=0 ppid=1452 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 10 00:52:16.677000 audit[1489]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.677000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc3749a220 a2=0 a3=7ffc3749a20c items=0 ppid=1452 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 10 00:52:16.678000 audit[1490]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:16.678000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc2f0298f0 a2=0 a3=7ffc2f0298dc items=0 ppid=1452 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 10 00:52:16.678000 audit[1491]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:16.678000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5ed5ad10 a2=0 a3=7ffe5ed5acfc items=0 ppid=1452 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 10 00:52:16.678000 audit[1492]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:16.678000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc39ce9bf0 a2=0 a3=7ffc39ce9bdc items=0 ppid=1452 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:16.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 10 00:52:16.760459 kubelet[1452]: I0910 00:52:16.760377 1452 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.143" Sep 10 00:52:16.765693 kubelet[1452]: I0910 00:52:16.765676 1452 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.143" Sep 10 00:52:16.765736 kubelet[1452]: E0910 00:52:16.765694 1452 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.0.0.143\": node \"10.0.0.143\" not found" Sep 10 00:52:16.777259 kubelet[1452]: E0910 00:52:16.777234 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:16.877780 kubelet[1452]: E0910 00:52:16.877742 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:16.978734 kubelet[1452]: E0910 00:52:16.978714 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:17.079298 kubelet[1452]: E0910 00:52:17.079240 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:17.179938 kubelet[1452]: E0910 00:52:17.179866 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:17.197074 kubelet[1452]: I0910 00:52:17.197036 1452 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 10 00:52:17.197239 kubelet[1452]: W0910 00:52:17.197217 1452 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 10 00:52:17.197268 kubelet[1452]: W0910 00:52:17.197243 1452 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 10 00:52:17.236372 kubelet[1452]: E0910 00:52:17.236348 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:17.265482 sudo[1346]: pam_unix(sudo:session): session closed for user root Sep 10 00:52:17.265000 audit[1346]: USER_END pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:17.265000 audit[1346]: CRED_DISP pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 10 00:52:17.266551 sshd[1343]: pam_unix(sshd:session): session closed for user core Sep 10 00:52:17.266000 audit[1343]: USER_END pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:17.266000 audit[1343]: CRED_DISP pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Sep 10 00:52:17.268583 systemd[1]: sshd@6-10.0.0.143:22-10.0.0.1:33112.service: Deactivated successfully. Sep 10 00:52:17.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:33112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 10 00:52:17.269212 systemd[1]: session-7.scope: Deactivated successfully. Sep 10 00:52:17.269643 systemd-logind[1207]: Session 7 logged out. Waiting for processes to exit. Sep 10 00:52:17.270189 systemd-logind[1207]: Removed session 7. Sep 10 00:52:17.280316 kubelet[1452]: E0910 00:52:17.280279 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:17.380877 kubelet[1452]: E0910 00:52:17.380818 1452 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Sep 10 00:52:17.481373 kubelet[1452]: I0910 00:52:17.481357 1452 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 10 00:52:17.481754 env[1212]: time="2025-09-10T00:52:17.481712586Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 10 00:52:17.481932 kubelet[1452]: I0910 00:52:17.481865 1452 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 10 00:52:18.236452 kubelet[1452]: I0910 00:52:18.236424 1452 apiserver.go:52] "Watching apiserver" Sep 10 00:52:18.236452 kubelet[1452]: E0910 00:52:18.236434 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:18.240287 kubelet[1452]: E0910 00:52:18.240243 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pwp6j" podUID="2bd1658b-d87b-47b3-883b-abab19e727b5" Sep 10 00:52:18.244978 systemd[1]: Created slice kubepods-besteffort-podab9763f3_cf91_48ae_a4c2_c09bd9e1b2bc.slice. Sep 10 00:52:18.256655 kubelet[1452]: I0910 00:52:18.256628 1452 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 10 00:52:18.261542 systemd[1]: Created slice kubepods-besteffort-pod0a4951c7_1dbc_451c_b218_e3fc10cbe1c6.slice. Sep 10 00:52:18.267098 kubelet[1452]: I0910 00:52:18.267065 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0a4951c7-1dbc-451c-b218-e3fc10cbe1c6-lib-modules\") pod \"kube-proxy-nblcs\" (UID: \"0a4951c7-1dbc-451c-b218-e3fc10cbe1c6\") " pod="kube-system/kube-proxy-nblcs" Sep 10 00:52:18.267098 kubelet[1452]: I0910 00:52:18.267094 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhl6w\" (UniqueName: \"kubernetes.io/projected/0a4951c7-1dbc-451c-b218-e3fc10cbe1c6-kube-api-access-qhl6w\") pod \"kube-proxy-nblcs\" (UID: \"0a4951c7-1dbc-451c-b218-e3fc10cbe1c6\") " pod="kube-system/kube-proxy-nblcs" Sep 10 00:52:18.267173 kubelet[1452]: I0910 00:52:18.267115 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-lib-modules\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267173 kubelet[1452]: I0910 00:52:18.267130 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-node-certs\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267173 kubelet[1452]: I0910 00:52:18.267144 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-xtables-lock\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267279 kubelet[1452]: I0910 00:52:18.267186 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ddwpd\" (UniqueName: \"kubernetes.io/projected/2bd1658b-d87b-47b3-883b-abab19e727b5-kube-api-access-ddwpd\") pod \"csi-node-driver-pwp6j\" (UID: \"2bd1658b-d87b-47b3-883b-abab19e727b5\") " pod="calico-system/csi-node-driver-pwp6j" Sep 10 00:52:18.267279 kubelet[1452]: I0910 00:52:18.267225 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0a4951c7-1dbc-451c-b218-e3fc10cbe1c6-xtables-lock\") pod \"kube-proxy-nblcs\" (UID: \"0a4951c7-1dbc-451c-b218-e3fc10cbe1c6\") " pod="kube-system/kube-proxy-nblcs" Sep 10 00:52:18.267279 kubelet[1452]: I0910 00:52:18.267255 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-cni-bin-dir\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267279 kubelet[1452]: I0910 00:52:18.267273 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-cni-log-dir\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267364 kubelet[1452]: I0910 00:52:18.267290 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-var-lib-calico\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267364 kubelet[1452]: I0910 00:52:18.267307 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2bd1658b-d87b-47b3-883b-abab19e727b5-varrun\") pod \"csi-node-driver-pwp6j\" (UID: \"2bd1658b-d87b-47b3-883b-abab19e727b5\") " pod="calico-system/csi-node-driver-pwp6j" Sep 10 00:52:18.267364 kubelet[1452]: I0910 00:52:18.267323 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0a4951c7-1dbc-451c-b218-e3fc10cbe1c6-kube-proxy\") pod \"kube-proxy-nblcs\" (UID: \"0a4951c7-1dbc-451c-b218-e3fc10cbe1c6\") " pod="kube-system/kube-proxy-nblcs" Sep 10 00:52:18.267364 kubelet[1452]: I0910 00:52:18.267341 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-policysync\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267364 kubelet[1452]: I0910 00:52:18.267358 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-flexvol-driver-host\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267478 kubelet[1452]: I0910 00:52:18.267373 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-tigera-ca-bundle\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267478 kubelet[1452]: I0910 00:52:18.267401 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-var-run-calico\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267478 kubelet[1452]: I0910 00:52:18.267427 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r2pds\" (UniqueName: \"kubernetes.io/projected/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-kube-api-access-r2pds\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.267478 kubelet[1452]: I0910 00:52:18.267443 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2bd1658b-d87b-47b3-883b-abab19e727b5-kubelet-dir\") pod \"csi-node-driver-pwp6j\" (UID: \"2bd1658b-d87b-47b3-883b-abab19e727b5\") " pod="calico-system/csi-node-driver-pwp6j" Sep 10 00:52:18.267478 kubelet[1452]: I0910 00:52:18.267459 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2bd1658b-d87b-47b3-883b-abab19e727b5-registration-dir\") pod \"csi-node-driver-pwp6j\" (UID: \"2bd1658b-d87b-47b3-883b-abab19e727b5\") " pod="calico-system/csi-node-driver-pwp6j" Sep 10 00:52:18.267599 kubelet[1452]: I0910 00:52:18.267472 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2bd1658b-d87b-47b3-883b-abab19e727b5-socket-dir\") pod \"csi-node-driver-pwp6j\" (UID: \"2bd1658b-d87b-47b3-883b-abab19e727b5\") " pod="calico-system/csi-node-driver-pwp6j" Sep 10 00:52:18.267599 kubelet[1452]: I0910 00:52:18.267508 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc-cni-net-dir\") pod \"calico-node-zbd6r\" (UID: \"ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc\") " pod="calico-system/calico-node-zbd6r" Sep 10 00:52:18.368585 kubelet[1452]: I0910 00:52:18.368546 1452 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 10 00:52:18.369128 kubelet[1452]: E0910 00:52:18.369106 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.369128 kubelet[1452]: W0910 00:52:18.369125 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.369201 kubelet[1452]: E0910 00:52:18.369151 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.369382 kubelet[1452]: E0910 00:52:18.369366 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.369382 kubelet[1452]: W0910 00:52:18.369376 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.369382 kubelet[1452]: E0910 00:52:18.369384 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.371031 kubelet[1452]: E0910 00:52:18.371004 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.371031 kubelet[1452]: W0910 00:52:18.371021 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.371031 kubelet[1452]: E0910 00:52:18.371038 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.469277 kubelet[1452]: E0910 00:52:18.469244 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.469277 kubelet[1452]: W0910 00:52:18.469261 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.469277 kubelet[1452]: E0910 00:52:18.469277 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.469466 kubelet[1452]: E0910 00:52:18.469443 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.469466 kubelet[1452]: W0910 00:52:18.469455 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.469466 kubelet[1452]: E0910 00:52:18.469465 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.469651 kubelet[1452]: E0910 00:52:18.469632 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.469651 kubelet[1452]: W0910 00:52:18.469642 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.469651 kubelet[1452]: E0910 00:52:18.469650 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.570474 kubelet[1452]: E0910 00:52:18.570392 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.570474 kubelet[1452]: W0910 00:52:18.570415 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.570474 kubelet[1452]: E0910 00:52:18.570426 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.570628 kubelet[1452]: E0910 00:52:18.570610 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.570628 kubelet[1452]: W0910 00:52:18.570623 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.570722 kubelet[1452]: E0910 00:52:18.570634 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.570957 kubelet[1452]: E0910 00:52:18.570917 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.570957 kubelet[1452]: W0910 00:52:18.570939 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.570957 kubelet[1452]: E0910 00:52:18.570959 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.672113 kubelet[1452]: E0910 00:52:18.672095 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.672113 kubelet[1452]: W0910 00:52:18.672106 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.672113 kubelet[1452]: E0910 00:52:18.672115 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.672286 kubelet[1452]: E0910 00:52:18.672264 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.672286 kubelet[1452]: W0910 00:52:18.672275 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.672286 kubelet[1452]: E0910 00:52:18.672282 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.672453 kubelet[1452]: E0910 00:52:18.672437 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.672453 kubelet[1452]: W0910 00:52:18.672446 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.672453 kubelet[1452]: E0910 00:52:18.672454 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.773352 kubelet[1452]: E0910 00:52:18.773333 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.773352 kubelet[1452]: W0910 00:52:18.773346 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.773431 kubelet[1452]: E0910 00:52:18.773355 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.773551 kubelet[1452]: E0910 00:52:18.773539 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.773551 kubelet[1452]: W0910 00:52:18.773549 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.773607 kubelet[1452]: E0910 00:52:18.773556 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.773718 kubelet[1452]: E0910 00:52:18.773696 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.773718 kubelet[1452]: W0910 00:52:18.773707 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.773718 kubelet[1452]: E0910 00:52:18.773714 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.826681 kubelet[1452]: E0910 00:52:18.826120 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.826681 kubelet[1452]: W0910 00:52:18.826132 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.826681 kubelet[1452]: E0910 00:52:18.826140 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.827293 kubelet[1452]: E0910 00:52:18.827268 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.827293 kubelet[1452]: W0910 00:52:18.827281 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.827293 kubelet[1452]: E0910 00:52:18.827290 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.862031 env[1212]: time="2025-09-10T00:52:18.861992384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zbd6r,Uid:ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc,Namespace:calico-system,Attempt:0,}" Sep 10 00:52:18.874432 kubelet[1452]: E0910 00:52:18.874406 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.874432 kubelet[1452]: W0910 00:52:18.874420 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.874432 kubelet[1452]: E0910 00:52:18.874431 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:18.975644 kubelet[1452]: E0910 00:52:18.975622 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:18.975644 kubelet[1452]: W0910 00:52:18.975639 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:18.975720 kubelet[1452]: E0910 00:52:18.975656 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:19.077036 kubelet[1452]: E0910 00:52:19.076973 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:19.077036 kubelet[1452]: W0910 00:52:19.076994 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:19.077036 kubelet[1452]: E0910 00:52:19.077015 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:19.177641 kubelet[1452]: E0910 00:52:19.177603 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:19.177641 kubelet[1452]: W0910 00:52:19.177620 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:19.177641 kubelet[1452]: E0910 00:52:19.177636 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:19.236842 kubelet[1452]: E0910 00:52:19.236808 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:19.278732 kubelet[1452]: E0910 00:52:19.278702 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:19.278732 kubelet[1452]: W0910 00:52:19.278721 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:19.278809 kubelet[1452]: E0910 00:52:19.278739 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:19.380075 kubelet[1452]: E0910 00:52:19.379992 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:19.380075 kubelet[1452]: W0910 00:52:19.380009 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:19.380075 kubelet[1452]: E0910 00:52:19.380024 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:19.406803 kubelet[1452]: E0910 00:52:19.406774 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 10 00:52:19.406803 kubelet[1452]: W0910 00:52:19.406799 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 10 00:52:19.406934 kubelet[1452]: E0910 00:52:19.406833 1452 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 10 00:52:19.464092 kubelet[1452]: E0910 00:52:19.464043 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 10 00:52:19.464646 env[1212]: time="2025-09-10T00:52:19.464598124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nblcs,Uid:0a4951c7-1dbc-451c-b218-e3fc10cbe1c6,Namespace:kube-system,Attempt:0,}" Sep 10 00:52:19.835405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3965029133.mount: Deactivated successfully. Sep 10 00:52:19.842159 env[1212]: time="2025-09-10T00:52:19.842091780Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.844793 env[1212]: time="2025-09-10T00:52:19.844737522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.845739 env[1212]: time="2025-09-10T00:52:19.845702441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.850272 env[1212]: time="2025-09-10T00:52:19.850222277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.851660 env[1212]: time="2025-09-10T00:52:19.851613957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.853141 env[1212]: time="2025-09-10T00:52:19.853111396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.854530 env[1212]: time="2025-09-10T00:52:19.854470905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.856023 env[1212]: time="2025-09-10T00:52:19.855975747Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:19.873918 env[1212]: time="2025-09-10T00:52:19.871996291Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 10 00:52:19.873918 env[1212]: time="2025-09-10T00:52:19.872030786Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 10 00:52:19.873918 env[1212]: time="2025-09-10T00:52:19.872040023Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 10 00:52:19.873918 env[1212]: time="2025-09-10T00:52:19.872161261Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5 pid=1532 runtime=io.containerd.runc.v2 Sep 10 00:52:19.876955 env[1212]: time="2025-09-10T00:52:19.876902462Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 10 00:52:19.876955 env[1212]: time="2025-09-10T00:52:19.876945353Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 10 00:52:19.877101 env[1212]: time="2025-09-10T00:52:19.876958808Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 10 00:52:19.877203 env[1212]: time="2025-09-10T00:52:19.877143534Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7e3b3e138d51875f3b30b3794cb145d4b1136d35bc15bd496932963d083f196 pid=1552 runtime=io.containerd.runc.v2 Sep 10 00:52:19.882341 systemd[1]: Started cri-containerd-3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5.scope. Sep 10 00:52:19.888439 systemd[1]: Started cri-containerd-b7e3b3e138d51875f3b30b3794cb145d4b1136d35bc15bd496932963d083f196.scope. Sep 10 00:52:19.898076 kernel: kauditd_printk_skb: 243 callbacks suppressed Sep 10 00:52:19.898200 kernel: audit: type=1400 audit(1757465539.893:414): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.898227 kernel: audit: type=1400 audit(1757465539.893:415): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906295 kernel: audit: type=1400 audit(1757465539.894:416): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906372 kernel: audit: type=1400 audit(1757465539.894:417): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906393 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 10 00:52:19.906415 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 10 00:52:19.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit: BPF prog-id=58 op=LOAD Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1532 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333164616232343364653739333039373835396131643964373763 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1532 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333164616232343364653739333039373835396131643964373763 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.907525 kernel: audit: type=1400 audit(1757465539.894:418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.907551 kernel: audit: type=1400 audit(1757465539.894:419): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.907569 kernel: audit: type=1400 audit(1757465539.894:420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.907587 kernel: audit: type=1400 audit(1757465539.894:421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.897000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit: BPF prog-id=60 op=LOAD Sep 10 00:52:19.897000 audit: BPF prog-id=59 op=LOAD Sep 10 00:52:19.897000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028ab00 items=0 ppid=1532 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333164616232343364653739333039373835396131643964373763 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1552 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653362336531333864353138373566336233306233373934636231 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1552 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653362336531333864353138373566336233306233373934636231 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.903000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028ab48 items=0 ppid=1532 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333164616232343364653739333039373835396131643964373763 Sep 10 00:52:19.906000 audit: BPF prog-id=61 op=UNLOAD Sep 10 00:52:19.906000 audit: BPF prog-id=59 op=UNLOAD Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.906000 audit: BPF prog-id=63 op=LOAD Sep 10 00:52:19.906000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028af58 items=0 ppid=1532 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332333164616232343364653739333039373835396131643964373763 Sep 10 00:52:19.903000 audit: BPF prog-id=62 op=LOAD Sep 10 00:52:19.903000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032cc80 items=0 ppid=1552 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653362336531333864353138373566336233306233373934636231 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit: BPF prog-id=64 op=LOAD Sep 10 00:52:19.918000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ccc8 items=0 ppid=1552 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653362336531333864353138373566336233306233373934636231 Sep 10 00:52:19.918000 audit: BPF prog-id=64 op=UNLOAD Sep 10 00:52:19.918000 audit: BPF prog-id=62 op=UNLOAD Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { perfmon } for pid=1564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit[1564]: AVC avc: denied { bpf } for pid=1564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:19.918000 audit: BPF prog-id=65 op=LOAD Sep 10 00:52:19.918000 audit[1564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032d0d8 items=0 ppid=1552 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:19.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237653362336531333864353138373566336233306233373934636231 Sep 10 00:52:19.928573 env[1212]: time="2025-09-10T00:52:19.928541043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zbd6r,Uid:ab9763f3-cf91-48ae-a4c2-c09bd9e1b2bc,Namespace:calico-system,Attempt:0,} returns sandbox id \"3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5\"" Sep 10 00:52:19.930716 env[1212]: time="2025-09-10T00:52:19.930691526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 10 00:52:19.931543 env[1212]: time="2025-09-10T00:52:19.931515641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nblcs,Uid:0a4951c7-1dbc-451c-b218-e3fc10cbe1c6,Namespace:kube-system,Attempt:0,} returns sandbox id \"b7e3b3e138d51875f3b30b3794cb145d4b1136d35bc15bd496932963d083f196\"" Sep 10 00:52:19.932241 kubelet[1452]: E0910 00:52:19.932210 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 10 00:52:20.237751 kubelet[1452]: E0910 00:52:20.237688 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:20.678095 kubelet[1452]: E0910 00:52:20.678054 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pwp6j" podUID="2bd1658b-d87b-47b3-883b-abab19e727b5" Sep 10 00:52:21.238626 kubelet[1452]: E0910 00:52:21.238599 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:21.510716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1638847062.mount: Deactivated successfully. Sep 10 00:52:21.619523 env[1212]: time="2025-09-10T00:52:21.619469618Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:21.621334 env[1212]: time="2025-09-10T00:52:21.621288739Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:21.622537 env[1212]: time="2025-09-10T00:52:21.622512504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:21.623765 env[1212]: time="2025-09-10T00:52:21.623738674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:21.624150 env[1212]: time="2025-09-10T00:52:21.624114929Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 10 00:52:21.624937 env[1212]: time="2025-09-10T00:52:21.624917034Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\"" Sep 10 00:52:21.626027 env[1212]: time="2025-09-10T00:52:21.625992210Z" level=info msg="CreateContainer within sandbox \"3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 10 00:52:21.640414 env[1212]: time="2025-09-10T00:52:21.640375664Z" level=info msg="CreateContainer within sandbox \"3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8\"" Sep 10 00:52:21.640843 env[1212]: time="2025-09-10T00:52:21.640820568Z" level=info msg="StartContainer for \"165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8\"" Sep 10 00:52:21.653936 systemd[1]: Started cri-containerd-165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8.scope. Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fb44a3b37b8 items=0 ppid=1532 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356161386431373532373633663538326136656335656135353964 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit: BPF prog-id=66 op=LOAD Sep 10 00:52:21.664000 audit[1612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000257e98 items=0 ppid=1532 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356161386431373532373633663538326136656335656135353964 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit: BPF prog-id=67 op=LOAD Sep 10 00:52:21.664000 audit[1612]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000257ee8 items=0 ppid=1532 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356161386431373532373633663538326136656335656135353964 Sep 10 00:52:21.664000 audit: BPF prog-id=67 op=UNLOAD Sep 10 00:52:21.664000 audit: BPF prog-id=66 op=UNLOAD Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { perfmon } for pid=1612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit[1612]: AVC avc: denied { bpf } for pid=1612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:21.664000 audit: BPF prog-id=68 op=LOAD Sep 10 00:52:21.664000 audit[1612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000257f78 items=0 ppid=1532 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136356161386431373532373633663538326136656335656135353964 Sep 10 00:52:21.675432 env[1212]: time="2025-09-10T00:52:21.675393906Z" level=info msg="StartContainer for \"165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8\" returns successfully" Sep 10 00:52:21.681621 systemd[1]: cri-containerd-165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8.scope: Deactivated successfully. Sep 10 00:52:21.685000 audit: BPF prog-id=68 op=UNLOAD Sep 10 00:52:21.771136 env[1212]: time="2025-09-10T00:52:21.771016242Z" level=info msg="shim disconnected" id=165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8 Sep 10 00:52:21.771136 env[1212]: time="2025-09-10T00:52:21.771068991Z" level=warning msg="cleaning up after shim disconnected" id=165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8 namespace=k8s.io Sep 10 00:52:21.771136 env[1212]: time="2025-09-10T00:52:21.771079340Z" level=info msg="cleaning up dead shim" Sep 10 00:52:21.777745 env[1212]: time="2025-09-10T00:52:21.777710516Z" level=warning msg="cleanup warnings time=\"2025-09-10T00:52:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1650 runtime=io.containerd.runc.v2\n" Sep 10 00:52:22.239748 kubelet[1452]: E0910 00:52:22.239695 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:22.470899 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-165aa8d1752763f582a6ec5ea559d663ae7f90ea2e90a928c0309b090b38c9d8-rootfs.mount: Deactivated successfully. Sep 10 00:52:22.678077 kubelet[1452]: E0910 00:52:22.678036 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pwp6j" podUID="2bd1658b-d87b-47b3-883b-abab19e727b5" Sep 10 00:52:22.686598 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2474148234.mount: Deactivated successfully. Sep 10 00:52:23.239963 kubelet[1452]: E0910 00:52:23.239912 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:23.280073 env[1212]: time="2025-09-10T00:52:23.280028388Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:23.281893 env[1212]: time="2025-09-10T00:52:23.281853691Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:507cc52f5f78c0cff25e904c76c18e6bfc90982e9cc2aa4dcb19033f21c3f679,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:23.283429 env[1212]: time="2025-09-10T00:52:23.283381817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:23.284659 env[1212]: time="2025-09-10T00:52:23.284624568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:90aa6b5f4065937521ff8438bc705317485d0be3f8b00a07145e697d92cc2cc6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:23.285036 env[1212]: time="2025-09-10T00:52:23.285011313Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\" returns image reference \"sha256:507cc52f5f78c0cff25e904c76c18e6bfc90982e9cc2aa4dcb19033f21c3f679\"" Sep 10 00:52:23.285860 env[1212]: time="2025-09-10T00:52:23.285830760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 10 00:52:23.286723 env[1212]: time="2025-09-10T00:52:23.286695912Z" level=info msg="CreateContainer within sandbox \"b7e3b3e138d51875f3b30b3794cb145d4b1136d35bc15bd496932963d083f196\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 10 00:52:23.300543 env[1212]: time="2025-09-10T00:52:23.300441440Z" level=info msg="CreateContainer within sandbox \"b7e3b3e138d51875f3b30b3794cb145d4b1136d35bc15bd496932963d083f196\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8cb5e97c68912d9a95b37a5a4524aa3b7f50e84c84da88ff11cc5d3522cfc0f2\"" Sep 10 00:52:23.300972 env[1212]: time="2025-09-10T00:52:23.300944153Z" level=info msg="StartContainer for \"8cb5e97c68912d9a95b37a5a4524aa3b7f50e84c84da88ff11cc5d3522cfc0f2\"" Sep 10 00:52:23.315644 systemd[1]: Started cri-containerd-8cb5e97c68912d9a95b37a5a4524aa3b7f50e84c84da88ff11cc5d3522cfc0f2.scope. Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2d225572f8 items=0 ppid=1552 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863623565393763363839313264396139356233376135613435323461 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit: BPF prog-id=69 op=LOAD Sep 10 00:52:23.327000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024818 items=0 ppid=1552 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863623565393763363839313264396139356233376135613435323461 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit: BPF prog-id=70 op=LOAD Sep 10 00:52:23.327000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024868 items=0 ppid=1552 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863623565393763363839313264396139356233376135613435323461 Sep 10 00:52:23.327000 audit: BPF prog-id=70 op=UNLOAD Sep 10 00:52:23.327000 audit: BPF prog-id=69 op=UNLOAD Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:23.327000 audit: BPF prog-id=71 op=LOAD Sep 10 00:52:23.327000 audit[1675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000248f8 items=0 ppid=1552 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863623565393763363839313264396139356233376135613435323461 Sep 10 00:52:23.338679 env[1212]: time="2025-09-10T00:52:23.338623264Z" level=info msg="StartContainer for \"8cb5e97c68912d9a95b37a5a4524aa3b7f50e84c84da88ff11cc5d3522cfc0f2\" returns successfully" Sep 10 00:52:23.442000 audit[1736]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.442000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfcc52690 a2=0 a3=7ffcfcc5267c items=0 ppid=1685 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 10 00:52:23.442000 audit[1737]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.442000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7cc45f50 a2=0 a3=7ffe7cc45f3c items=0 ppid=1685 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 10 00:52:23.443000 audit[1738]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.443000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeafadddc0 a2=0 a3=7ffeafadddac items=0 ppid=1685 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 10 00:52:23.443000 audit[1739]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.443000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc03fcce0 a2=0 a3=7fffc03fcccc items=0 ppid=1685 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 10 00:52:23.443000 audit[1740]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.443000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7405b840 a2=0 a3=7ffc7405b82c items=0 ppid=1685 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 10 00:52:23.445000 audit[1741]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.445000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc858d9ad0 a2=0 a3=7ffc858d9abc items=0 ppid=1685 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 10 00:52:23.545000 audit[1742]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.545000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcddd77540 a2=0 a3=7ffcddd7752c items=0 ppid=1685 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 10 00:52:23.547000 audit[1744]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.547000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffed782320 a2=0 a3=7fffed78230c items=0 ppid=1685 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 10 00:52:23.550000 audit[1747]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.550000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd242d9340 a2=0 a3=7ffd242d932c items=0 ppid=1685 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 10 00:52:23.551000 audit[1748]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.551000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc3a2cda0 a2=0 a3=7fffc3a2cd8c items=0 ppid=1685 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 10 00:52:23.553000 audit[1750]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.553000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe5c37080 a2=0 a3=7fffe5c3706c items=0 ppid=1685 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 10 00:52:23.554000 audit[1751]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.554000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcba855960 a2=0 a3=7ffcba85594c items=0 ppid=1685 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 10 00:52:23.555000 audit[1753]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.555000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcdbf783a0 a2=0 a3=7ffcdbf7838c items=0 ppid=1685 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 10 00:52:23.558000 audit[1756]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.558000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcbd65dae0 a2=0 a3=7ffcbd65dacc items=0 ppid=1685 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 10 00:52:23.559000 audit[1757]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.559000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc72ad9c50 a2=0 a3=7ffc72ad9c3c items=0 ppid=1685 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 10 00:52:23.561000 audit[1759]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.561000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd76441050 a2=0 a3=7ffd7644103c items=0 ppid=1685 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 10 00:52:23.561000 audit[1760]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.561000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe14661460 a2=0 a3=7ffe1466144c items=0 ppid=1685 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 10 00:52:23.563000 audit[1762]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.563000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc07442570 a2=0 a3=7ffc0744255c items=0 ppid=1685 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 10 00:52:23.566000 audit[1765]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.566000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcbdc72c0 a2=0 a3=7ffdcbdc72ac items=0 ppid=1685 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 10 00:52:23.568000 audit[1768]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.568000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9e8e4b80 a2=0 a3=7ffd9e8e4b6c items=0 ppid=1685 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 10 00:52:23.569000 audit[1769]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.569000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe7f0b6be0 a2=0 a3=7ffe7f0b6bcc items=0 ppid=1685 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 10 00:52:23.571000 audit[1771]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.571000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd0f2dc400 a2=0 a3=7ffd0f2dc3ec items=0 ppid=1685 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 10 00:52:23.593000 audit[1775]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.593000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffbfec0ed0 a2=0 a3=7fffbfec0ebc items=0 ppid=1685 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 10 00:52:23.594000 audit[1776]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.594000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2012a0f0 a2=0 a3=7ffc2012a0dc items=0 ppid=1685 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 10 00:52:23.595000 audit[1778]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 10 00:52:23.595000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff81a0fa30 a2=0 a3=7fff81a0fa1c items=0 ppid=1685 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 10 00:52:23.613000 audit[1784]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:23.613000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe2410dd30 a2=0 a3=7ffe2410dd1c items=0 ppid=1685 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:23.630000 audit[1784]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:23.630000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffe2410dd30 a2=0 a3=7ffe2410dd1c items=0 ppid=1685 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:23.631000 audit[1791]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.631000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc8dbeda70 a2=0 a3=7ffc8dbeda5c items=0 ppid=1685 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 10 00:52:23.633000 audit[1793]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.633000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb9015c20 a2=0 a3=7ffeb9015c0c items=0 ppid=1685 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 10 00:52:23.635000 audit[1796]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.635000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd5d063270 a2=0 a3=7ffd5d06325c items=0 ppid=1685 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 10 00:52:23.636000 audit[1797]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.636000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe66072000 a2=0 a3=7ffe66071fec items=0 ppid=1685 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 10 00:52:23.638000 audit[1799]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.638000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcac041ea0 a2=0 a3=7ffcac041e8c items=0 ppid=1685 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 10 00:52:23.639000 audit[1800]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.639000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc193c6950 a2=0 a3=7ffc193c693c items=0 ppid=1685 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 10 00:52:23.641000 audit[1802]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.641000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6fbd4280 a2=0 a3=7fff6fbd426c items=0 ppid=1685 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 10 00:52:23.644000 audit[1805]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.644000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffaca0d9f0 a2=0 a3=7fffaca0d9dc items=0 ppid=1685 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 10 00:52:23.644000 audit[1806]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.644000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2f55a970 a2=0 a3=7ffc2f55a95c items=0 ppid=1685 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 10 00:52:23.646000 audit[1808]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.646000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc50e41390 a2=0 a3=7ffc50e4137c items=0 ppid=1685 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 10 00:52:23.647000 audit[1809]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.647000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfaabfe40 a2=0 a3=7ffdfaabfe2c items=0 ppid=1685 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 10 00:52:23.649000 audit[1811]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.649000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb4f50490 a2=0 a3=7ffeb4f5047c items=0 ppid=1685 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 10 00:52:23.651000 audit[1814]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.651000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec3df12e0 a2=0 a3=7ffec3df12cc items=0 ppid=1685 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 10 00:52:23.654000 audit[1817]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.654000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeea542160 a2=0 a3=7ffeea54214c items=0 ppid=1685 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 10 00:52:23.655000 audit[1818]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.655000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff073ae650 a2=0 a3=7fff073ae63c items=0 ppid=1685 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 10 00:52:23.656000 audit[1820]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.656000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff3bbaedf0 a2=0 a3=7fff3bbaeddc items=0 ppid=1685 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 10 00:52:23.659000 audit[1823]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.659000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffe59d22f0 a2=0 a3=7fffe59d22dc items=0 ppid=1685 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 10 00:52:23.660000 audit[1824]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.660000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebcb2f840 a2=0 a3=7ffebcb2f82c items=0 ppid=1685 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 10 00:52:23.661000 audit[1826]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.661000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc8112faf0 a2=0 a3=7ffc8112fadc items=0 ppid=1685 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 10 00:52:23.662000 audit[1827]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.662000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8e240ad0 a2=0 a3=7ffe8e240abc items=0 ppid=1685 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 10 00:52:23.664000 audit[1829]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.664000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd8aa45f50 a2=0 a3=7ffd8aa45f3c items=0 ppid=1685 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 10 00:52:23.666000 audit[1832]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 10 00:52:23.666000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef41dfca0 a2=0 a3=7ffef41dfc8c items=0 ppid=1685 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 10 00:52:23.670000 audit[1834]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 10 00:52:23.670000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe6dafd6d0 a2=0 a3=7ffe6dafd6bc items=0 ppid=1685 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.670000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:23.670000 audit[1834]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 10 00:52:23.670000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe6dafd6d0 a2=0 a3=7ffe6dafd6bc items=0 ppid=1685 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:23.670000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:23.692331 kubelet[1452]: E0910 00:52:23.692294 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 10 00:52:24.240575 kubelet[1452]: E0910 00:52:24.240537 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:24.677862 kubelet[1452]: E0910 00:52:24.677803 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pwp6j" podUID="2bd1658b-d87b-47b3-883b-abab19e727b5" Sep 10 00:52:24.698043 kubelet[1452]: E0910 00:52:24.697997 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Sep 10 00:52:25.241575 kubelet[1452]: E0910 00:52:25.241538 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:25.911000 audit[1836]: NETFILTER_CFG table=filter:65 family=2 entries=19 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:25.913253 kernel: kauditd_printk_skb: 348 callbacks suppressed Sep 10 00:52:25.913317 kernel: audit: type=1325 audit(1757465545.911:514): table=filter:65 family=2 entries=19 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:25.911000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffda76a9280 a2=0 a3=7ffda76a926c items=0 ppid=1685 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:25.919727 kernel: audit: type=1300 audit(1757465545.911:514): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffda76a9280 a2=0 a3=7ffda76a926c items=0 ppid=1685 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:25.919761 kernel: audit: type=1327 audit(1757465545.911:514): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:25.911000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:25.925000 audit[1836]: NETFILTER_CFG table=nat:66 family=2 entries=21 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:25.925000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffda76a9280 a2=0 a3=7ffda76a926c items=0 ppid=1685 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:25.932678 kernel: audit: type=1325 audit(1757465545.925:515): table=nat:66 family=2 entries=21 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:25.932714 kernel: audit: type=1300 audit(1757465545.925:515): arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffda76a9280 a2=0 a3=7ffda76a926c items=0 ppid=1685 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:25.932739 kernel: audit: type=1327 audit(1757465545.925:515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:25.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:25.939000 audit[1838]: NETFILTER_CFG table=filter:67 family=2 entries=15 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:25.939000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe958950f0 a2=0 a3=7ffe958950dc items=0 ppid=1685 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:25.947047 kernel: audit: type=1325 audit(1757465545.939:516): table=filter:67 family=2 entries=15 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:25.947090 kernel: audit: type=1300 audit(1757465545.939:516): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe958950f0 a2=0 a3=7ffe958950dc items=0 ppid=1685 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:25.947109 kernel: audit: type=1327 audit(1757465545.939:516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:25.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:25.949000 audit[1838]: NETFILTER_CFG table=nat:68 family=2 entries=37 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:25.949000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffe958950f0 a2=0 a3=7ffe958950dc items=0 ppid=1685 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:25.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:25.953524 kernel: audit: type=1325 audit(1757465545.949:517): table=nat:68 family=2 entries=37 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:26.242586 kubelet[1452]: E0910 00:52:26.242460 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:26.677589 kubelet[1452]: E0910 00:52:26.677543 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pwp6j" podUID="2bd1658b-d87b-47b3-883b-abab19e727b5" Sep 10 00:52:27.035267 env[1212]: time="2025-09-10T00:52:27.035118082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:27.037181 env[1212]: time="2025-09-10T00:52:27.037142258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:27.039178 env[1212]: time="2025-09-10T00:52:27.039132941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:27.040566 env[1212]: time="2025-09-10T00:52:27.040537034Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:27.041002 env[1212]: time="2025-09-10T00:52:27.040971269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 10 00:52:27.042980 env[1212]: time="2025-09-10T00:52:27.042957694Z" level=info msg="CreateContainer within sandbox \"3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 10 00:52:27.056626 env[1212]: time="2025-09-10T00:52:27.056574390Z" level=info msg="CreateContainer within sandbox \"3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7\"" Sep 10 00:52:27.056962 env[1212]: time="2025-09-10T00:52:27.056910981Z" level=info msg="StartContainer for \"78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7\"" Sep 10 00:52:27.072403 systemd[1]: run-containerd-runc-k8s.io-78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7-runc.oavJyo.mount: Deactivated successfully. Sep 10 00:52:27.075085 systemd[1]: Started cri-containerd-78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7.scope. Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff3bd38aa88 items=0 ppid=1532 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656433326430666237393464336264613234343232653462653465 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit: BPF prog-id=72 op=LOAD Sep 10 00:52:27.086000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030c678 items=0 ppid=1532 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656433326430666237393464336264613234343232653462653465 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit: BPF prog-id=73 op=LOAD Sep 10 00:52:27.086000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030c6c8 items=0 ppid=1532 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656433326430666237393464336264613234343232653462653465 Sep 10 00:52:27.086000 audit: BPF prog-id=73 op=UNLOAD Sep 10 00:52:27.086000 audit: BPF prog-id=72 op=UNLOAD Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:27.086000 audit: BPF prog-id=74 op=LOAD Sep 10 00:52:27.086000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030c758 items=0 ppid=1532 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:27.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738656433326430666237393464336264613234343232653462653465 Sep 10 00:52:27.203170 env[1212]: time="2025-09-10T00:52:27.203100509Z" level=info msg="StartContainer for \"78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7\" returns successfully" Sep 10 00:52:27.243039 kubelet[1452]: E0910 00:52:27.242993 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:27.951394 kubelet[1452]: I0910 00:52:27.951319 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-nblcs" podStartSLOduration=8.598265524 podStartE2EDuration="11.951301142s" podCreationTimestamp="2025-09-10 00:52:16 +0000 UTC" firstStartedPulling="2025-09-10 00:52:19.932639689 +0000 UTC m=+4.184893881" lastFinishedPulling="2025-09-10 00:52:23.285675318 +0000 UTC m=+7.537929499" observedRunningTime="2025-09-10 00:52:23.699333956 +0000 UTC m=+7.951588137" watchObservedRunningTime="2025-09-10 00:52:27.951301142 +0000 UTC m=+12.203555333" Sep 10 00:52:28.107079 env[1212]: time="2025-09-10T00:52:28.107008048Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 10 00:52:28.108597 systemd[1]: cri-containerd-78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7.scope: Deactivated successfully. Sep 10 00:52:28.114000 audit: BPF prog-id=74 op=UNLOAD Sep 10 00:52:28.123789 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7-rootfs.mount: Deactivated successfully. Sep 10 00:52:28.136423 kubelet[1452]: I0910 00:52:28.136373 1452 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 10 00:52:28.244223 kubelet[1452]: E0910 00:52:28.244131 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:28.681730 systemd[1]: Created slice kubepods-besteffort-pod2bd1658b_d87b_47b3_883b_abab19e727b5.slice. Sep 10 00:52:28.683229 env[1212]: time="2025-09-10T00:52:28.683195986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pwp6j,Uid:2bd1658b-d87b-47b3-883b-abab19e727b5,Namespace:calico-system,Attempt:0,}" Sep 10 00:52:28.826849 env[1212]: time="2025-09-10T00:52:28.826802720Z" level=info msg="shim disconnected" id=78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7 Sep 10 00:52:28.826849 env[1212]: time="2025-09-10T00:52:28.826847274Z" level=warning msg="cleaning up after shim disconnected" id=78ed32d0fb794d3bda24422e4be4e6e11efa2ab5bb20902b445c11264fa383b7 namespace=k8s.io Sep 10 00:52:28.826999 env[1212]: time="2025-09-10T00:52:28.826857633Z" level=info msg="cleaning up dead shim" Sep 10 00:52:28.833197 env[1212]: time="2025-09-10T00:52:28.833167767Z" level=warning msg="cleanup warnings time=\"2025-09-10T00:52:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1889 runtime=io.containerd.runc.v2\n" Sep 10 00:52:28.876618 env[1212]: time="2025-09-10T00:52:28.876537681Z" level=error msg="Failed to destroy network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:28.876922 env[1212]: time="2025-09-10T00:52:28.876885453Z" level=error msg="encountered an error cleaning up failed sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:28.876976 env[1212]: time="2025-09-10T00:52:28.876936028Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pwp6j,Uid:2bd1658b-d87b-47b3-883b-abab19e727b5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:28.877223 kubelet[1452]: E0910 00:52:28.877173 1452 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:28.877292 kubelet[1452]: E0910 00:52:28.877254 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pwp6j" Sep 10 00:52:28.877292 kubelet[1452]: E0910 00:52:28.877280 1452 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pwp6j" Sep 10 00:52:28.877359 kubelet[1452]: E0910 00:52:28.877325 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-pwp6j_calico-system(2bd1658b-d87b-47b3-883b-abab19e727b5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-pwp6j_calico-system(2bd1658b-d87b-47b3-883b-abab19e727b5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pwp6j" podUID="2bd1658b-d87b-47b3-883b-abab19e727b5" Sep 10 00:52:28.878067 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0-shm.mount: Deactivated successfully. Sep 10 00:52:28.930000 audit[1934]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:28.930000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd34e3a1f0 a2=0 a3=7ffd34e3a1dc items=0 ppid=1685 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:28.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:28.935000 audit[1934]: NETFILTER_CFG table=nat:70 family=2 entries=46 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:28.935000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffd34e3a1f0 a2=0 a3=7ffd34e3a1dc items=0 ppid=1685 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:28.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:28.946000 audit[1936]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:28.946000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd7a6ec9c0 a2=0 a3=7ffd7a6ec9ac items=0 ppid=1685 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:28.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:28.959000 audit[1936]: NETFILTER_CFG table=nat:72 family=2 entries=58 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:28.959000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffd7a6ec9c0 a2=0 a3=7ffd7a6ec9ac items=0 ppid=1685 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:28.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:29.244962 kubelet[1452]: E0910 00:52:29.244881 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:29.707986 kubelet[1452]: I0910 00:52:29.707961 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:52:29.708104 env[1212]: time="2025-09-10T00:52:29.708062406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 10 00:52:29.708482 env[1212]: time="2025-09-10T00:52:29.708449272Z" level=info msg="StopPodSandbox for \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\"" Sep 10 00:52:29.727432 env[1212]: time="2025-09-10T00:52:29.727386356Z" level=error msg="StopPodSandbox for \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\" failed" error="failed to destroy network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:29.727587 kubelet[1452]: E0910 00:52:29.727557 1452 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:52:29.727630 kubelet[1452]: E0910 00:52:29.727606 1452 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0"} Sep 10 00:52:29.727654 kubelet[1452]: E0910 00:52:29.727646 1452 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bd1658b-d87b-47b3-883b-abab19e727b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 10 00:52:29.727714 kubelet[1452]: E0910 00:52:29.727667 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bd1658b-d87b-47b3-883b-abab19e727b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pwp6j" podUID="2bd1658b-d87b-47b3-883b-abab19e727b5" Sep 10 00:52:30.245782 kubelet[1452]: E0910 00:52:30.245748 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:31.246470 kubelet[1452]: E0910 00:52:31.246416 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:32.247140 kubelet[1452]: E0910 00:52:32.247080 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:33.247521 kubelet[1452]: E0910 00:52:33.247467 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:33.670849 systemd[1]: Created slice kubepods-besteffort-pod5fc69035_f0dd_40e1_97ce_6557c879b47d.slice. Sep 10 00:52:33.755568 kubelet[1452]: I0910 00:52:33.755517 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-57z4c\" (UniqueName: \"kubernetes.io/projected/5fc69035-f0dd-40e1-97ce-6557c879b47d-kube-api-access-57z4c\") pod \"nginx-deployment-8587fbcb89-nnt95\" (UID: \"5fc69035-f0dd-40e1-97ce-6557c879b47d\") " pod="default/nginx-deployment-8587fbcb89-nnt95" Sep 10 00:52:33.946000 audit[1959]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:33.948399 kernel: kauditd_printk_skb: 58 callbacks suppressed Sep 10 00:52:33.948456 kernel: audit: type=1325 audit(1757465553.946:529): table=filter:73 family=2 entries=12 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:33.946000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffecf8114e0 a2=0 a3=7ffecf8114cc items=0 ppid=1685 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:33.955590 kernel: audit: type=1300 audit(1757465553.946:529): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffecf8114e0 a2=0 a3=7ffecf8114cc items=0 ppid=1685 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:33.955631 kernel: audit: type=1327 audit(1757465553.946:529): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:33.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:33.959000 audit[1959]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:33.959000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffecf8114e0 a2=0 a3=7ffecf8114cc items=0 ppid=1685 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:33.967331 kernel: audit: type=1325 audit(1757465553.959:530): table=nat:74 family=2 entries=22 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:33.967380 kernel: audit: type=1300 audit(1757465553.959:530): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffecf8114e0 a2=0 a3=7ffecf8114cc items=0 ppid=1685 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:33.967409 kernel: audit: type=1327 audit(1757465553.959:530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:33.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:33.973052 env[1212]: time="2025-09-10T00:52:33.973015025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-nnt95,Uid:5fc69035-f0dd-40e1-97ce-6557c879b47d,Namespace:default,Attempt:0,}" Sep 10 00:52:34.028709 env[1212]: time="2025-09-10T00:52:34.028644280Z" level=error msg="Failed to destroy network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:34.030102 env[1212]: time="2025-09-10T00:52:34.028972455Z" level=error msg="encountered an error cleaning up failed sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:34.030102 env[1212]: time="2025-09-10T00:52:34.029010356Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-nnt95,Uid:5fc69035-f0dd-40e1-97ce-6557c879b47d,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:34.030205 kubelet[1452]: E0910 00:52:34.029211 1452 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:34.030205 kubelet[1452]: E0910 00:52:34.029267 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-nnt95" Sep 10 00:52:34.030205 kubelet[1452]: E0910 00:52:34.029286 1452 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-nnt95" Sep 10 00:52:34.030290 kubelet[1452]: E0910 00:52:34.029320 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-nnt95_default(5fc69035-f0dd-40e1-97ce-6557c879b47d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-nnt95_default(5fc69035-f0dd-40e1-97ce-6557c879b47d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-nnt95" podUID="5fc69035-f0dd-40e1-97ce-6557c879b47d" Sep 10 00:52:34.030287 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9-shm.mount: Deactivated successfully. Sep 10 00:52:34.248094 kubelet[1452]: E0910 00:52:34.247995 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:34.714465 kubelet[1452]: I0910 00:52:34.714442 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:52:34.714867 env[1212]: time="2025-09-10T00:52:34.714837026Z" level=info msg="StopPodSandbox for \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\"" Sep 10 00:52:34.734142 env[1212]: time="2025-09-10T00:52:34.734087798Z" level=error msg="StopPodSandbox for \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\" failed" error="failed to destroy network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 10 00:52:34.734327 kubelet[1452]: E0910 00:52:34.734300 1452 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:52:34.734373 kubelet[1452]: E0910 00:52:34.734342 1452 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9"} Sep 10 00:52:34.734396 kubelet[1452]: E0910 00:52:34.734374 1452 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5fc69035-f0dd-40e1-97ce-6557c879b47d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 10 00:52:34.734456 kubelet[1452]: E0910 00:52:34.734401 1452 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5fc69035-f0dd-40e1-97ce-6557c879b47d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-nnt95" podUID="5fc69035-f0dd-40e1-97ce-6557c879b47d" Sep 10 00:52:34.952000 audit[2011]: NETFILTER_CFG table=filter:75 family=2 entries=12 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:34.962125 kernel: audit: type=1325 audit(1757465554.952:531): table=filter:75 family=2 entries=12 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:34.962267 kernel: audit: type=1300 audit(1757465554.952:531): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc0d523a10 a2=0 a3=7ffc0d5239fc items=0 ppid=1685 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:34.962284 kernel: audit: type=1327 audit(1757465554.952:531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:34.952000 audit[2011]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc0d523a10 a2=0 a3=7ffc0d5239fc items=0 ppid=1685 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:34.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:34.963000 audit[2011]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:34.963000 audit[2011]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc0d523a10 a2=0 a3=7ffc0d5239fc items=0 ppid=1685 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:34.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:34.967522 kernel: audit: type=1325 audit(1757465554.963:532): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:35.249120 kubelet[1452]: E0910 00:52:35.248982 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:35.504000 audit[2013]: NETFILTER_CFG table=filter:77 family=2 entries=11 op=nft_register_rule pid=2013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:35.504000 audit[2013]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe830427e0 a2=0 a3=7ffe830427cc items=0 ppid=1685 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:35.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:35.509000 audit[2013]: NETFILTER_CFG table=nat:78 family=2 entries=29 op=nft_register_chain pid=2013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:35.509000 audit[2013]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffe830427e0 a2=0 a3=7ffe830427cc items=0 ppid=1685 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:35.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:36.235965 kubelet[1452]: E0910 00:52:36.235905 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:36.249467 kubelet[1452]: E0910 00:52:36.249402 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:37.181208 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount732067283.mount: Deactivated successfully. Sep 10 00:52:37.250543 kubelet[1452]: E0910 00:52:37.250492 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:37.534127 env[1212]: time="2025-09-10T00:52:37.533992789Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:37.536151 env[1212]: time="2025-09-10T00:52:37.536117734Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:37.537964 env[1212]: time="2025-09-10T00:52:37.537931556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:37.539457 env[1212]: time="2025-09-10T00:52:37.539429155Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:37.539814 env[1212]: time="2025-09-10T00:52:37.539769393Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 10 00:52:37.549262 env[1212]: time="2025-09-10T00:52:37.549002768Z" level=info msg="CreateContainer within sandbox \"3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 10 00:52:37.563613 env[1212]: time="2025-09-10T00:52:37.563572332Z" level=info msg="CreateContainer within sandbox \"3231dab243de793097859a1d9d77c30f8174db7825ffbe46619024941079add5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ccba3309929cfbf353d1d9d6f702fc8264582fa7f5b20939185b27e8ce676775\"" Sep 10 00:52:37.564008 env[1212]: time="2025-09-10T00:52:37.563974085Z" level=info msg="StartContainer for \"ccba3309929cfbf353d1d9d6f702fc8264582fa7f5b20939185b27e8ce676775\"" Sep 10 00:52:37.578940 systemd[1]: Started cri-containerd-ccba3309929cfbf353d1d9d6f702fc8264582fa7f5b20939185b27e8ce676775.scope. Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f910815dba8 items=0 ppid=1532 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:37.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133333039393239636662663335336431643964366637303266 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.593000 audit: BPF prog-id=75 op=LOAD Sep 10 00:52:37.593000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002894d8 items=0 ppid=1532 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:37.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133333039393239636662663335336431643964366637303266 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit: BPF prog-id=76 op=LOAD Sep 10 00:52:37.594000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000289528 items=0 ppid=1532 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:37.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133333039393239636662663335336431643964366637303266 Sep 10 00:52:37.594000 audit: BPF prog-id=76 op=UNLOAD Sep 10 00:52:37.594000 audit: BPF prog-id=75 op=UNLOAD Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:37.594000 audit: BPF prog-id=77 op=LOAD Sep 10 00:52:37.594000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002895b8 items=0 ppid=1532 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:37.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133333039393239636662663335336431643964366637303266 Sep 10 00:52:37.606574 env[1212]: time="2025-09-10T00:52:37.606537036Z" level=info msg="StartContainer for \"ccba3309929cfbf353d1d9d6f702fc8264582fa7f5b20939185b27e8ce676775\" returns successfully" Sep 10 00:52:37.683851 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 10 00:52:37.683934 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 10 00:52:37.745460 kubelet[1452]: I0910 00:52:37.745393 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zbd6r" podStartSLOduration=4.134843745 podStartE2EDuration="21.745377832s" podCreationTimestamp="2025-09-10 00:52:16 +0000 UTC" firstStartedPulling="2025-09-10 00:52:19.930039183 +0000 UTC m=+4.182293374" lastFinishedPulling="2025-09-10 00:52:37.54057327 +0000 UTC m=+21.792827461" observedRunningTime="2025-09-10 00:52:37.744148747 +0000 UTC m=+21.996402928" watchObservedRunningTime="2025-09-10 00:52:37.745377832 +0000 UTC m=+21.997632023" Sep 10 00:52:38.251390 kubelet[1452]: E0910 00:52:38.251334 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:38.741777 systemd[1]: run-containerd-runc-k8s.io-ccba3309929cfbf353d1d9d6f702fc8264582fa7f5b20939185b27e8ce676775-runc.iDKzsq.mount: Deactivated successfully. Sep 10 00:52:38.977842 kernel: kauditd_printk_skb: 51 callbacks suppressed Sep 10 00:52:38.977976 kernel: audit: type=1400 audit(1757465558.973:541): avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=20865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:38.973000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=20865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:38.981620 kernel: audit: type=1400 audit(1757465558.973:542): avc: denied { write } for pid=2199 comm="tee" name="fd" dev="proc" ino=20288 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:38.973000 audit[2199]: AVC avc: denied { write } for pid=2199 comm="tee" name="fd" dev="proc" ino=20288 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:38.986397 kernel: audit: type=1300 audit(1757465558.973:542): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef36827f2 a2=241 a3=1b6 items=1 ppid=2143 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:38.973000 audit[2199]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef36827f2 a2=241 a3=1b6 items=1 ppid=2143 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:38.973000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 10 00:52:38.993740 kernel: audit: type=1307 audit(1757465558.973:542): cwd="/etc/service/enabled/cni/log" Sep 10 00:52:38.993806 kernel: audit: type=1302 audit(1757465558.973:542): item=0 name="/dev/fd/63" inode=20282 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:38.973000 audit: PATH item=0 name="/dev/fd/63" inode=20282 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:38.996636 kernel: audit: type=1327 audit(1757465558.973:542): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:38.973000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:38.976000 audit[2203]: AVC avc: denied { write } for pid=2203 comm="tee" name="fd" dev="proc" ino=20292 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:39.005853 kernel: audit: type=1400 audit(1757465558.976:543): avc: denied { write } for pid=2203 comm="tee" name="fd" dev="proc" ino=20292 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:39.005890 kernel: audit: type=1300 audit(1757465558.976:543): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff407e7f0 a2=241 a3=1b6 items=1 ppid=2149 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:38.976000 audit[2203]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff407e7f0 a2=241 a3=1b6 items=1 ppid=2149 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.007219 kernel: audit: type=1307 audit(1757465558.976:543): cwd="/etc/service/enabled/bird6/log" Sep 10 00:52:38.976000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 10 00:52:39.010219 kernel: audit: type=1302 audit(1757465558.976:543): item=0 name="/dev/fd/63" inode=20285 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:38.976000 audit: PATH item=0 name="/dev/fd/63" inode=20285 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:38.976000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:38.983000 audit[2189]: AVC avc: denied { write } for pid=2189 comm="tee" name="fd" dev="proc" ino=18249 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:38.983000 audit[2189]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe25d637f0 a2=241 a3=1b6 items=1 ppid=2140 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:38.983000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 10 00:52:38.983000 audit: PATH item=0 name="/dev/fd/63" inode=18246 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:38.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:38.994000 audit[2211]: AVC avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=19052 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:38.994000 audit[2211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc377157e1 a2=241 a3=1b6 items=1 ppid=2153 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:38.994000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 10 00:52:38.994000 audit: PATH item=0 name="/dev/fd/63" inode=20298 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:38.994000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:38.973000 audit[2193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9e6077f1 a2=241 a3=1b6 items=1 ppid=2137 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:38.973000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 10 00:52:38.973000 audit: PATH item=0 name="/dev/fd/63" inode=20858 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:38.973000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:39.001000 audit[2195]: AVC avc: denied { write } for pid=2195 comm="tee" name="fd" dev="proc" ino=19056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:39.001000 audit[2195]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0901e7e0 a2=241 a3=1b6 items=1 ppid=2146 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.001000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 10 00:52:39.001000 audit: PATH item=0 name="/dev/fd/63" inode=20859 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:39.001000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:39.010000 audit[2217]: AVC avc: denied { write } for pid=2217 comm="tee" name="fd" dev="proc" ino=20301 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 10 00:52:39.010000 audit[2217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc98b207f0 a2=241 a3=1b6 items=1 ppid=2147 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.010000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 10 00:52:39.010000 audit: PATH item=0 name="/dev/fd/63" inode=20867 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:52:39.010000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.086000 audit: BPF prog-id=78 op=LOAD Sep 10 00:52:39.086000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd38cfff70 a2=98 a3=1fffffffffffffff items=0 ppid=2144 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.086000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 10 00:52:39.087000 audit: BPF prog-id=78 op=UNLOAD Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit: BPF prog-id=79 op=LOAD Sep 10 00:52:39.087000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd38cffe50 a2=94 a3=3 items=0 ppid=2144 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.087000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 10 00:52:39.087000 audit: BPF prog-id=79 op=UNLOAD Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.087000 audit: BPF prog-id=80 op=LOAD Sep 10 00:52:39.087000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd38cffe90 a2=94 a3=7ffd38d00070 items=0 ppid=2144 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.087000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 10 00:52:39.088000 audit: BPF prog-id=80 op=UNLOAD Sep 10 00:52:39.088000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.088000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd38cfff60 a2=50 a3=a000000085 items=0 ppid=2144 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.088000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.089000 audit: BPF prog-id=81 op=LOAD Sep 10 00:52:39.089000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1a3f0eb0 a2=98 a3=3 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.089000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.090000 audit: BPF prog-id=81 op=UNLOAD Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.090000 audit: BPF prog-id=82 op=LOAD Sep 10 00:52:39.090000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1a3f0ca0 a2=94 a3=54428f items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.090000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.091000 audit: BPF prog-id=82 op=UNLOAD Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.091000 audit: BPF prog-id=83 op=LOAD Sep 10 00:52:39.091000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1a3f0cd0 a2=94 a3=2 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.091000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.092000 audit: BPF prog-id=83 op=UNLOAD Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit: BPF prog-id=84 op=LOAD Sep 10 00:52:39.192000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1a3f0b90 a2=94 a3=1 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.192000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.192000 audit: BPF prog-id=84 op=UNLOAD Sep 10 00:52:39.192000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.192000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff1a3f0c60 a2=50 a3=7fff1a3f0d40 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.192000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1a3f0ba0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1a3f0bd0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1a3f0ae0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1a3f0bf0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1a3f0bd0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1a3f0bc0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1a3f0bf0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1a3f0bd0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1a3f0bf0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1a3f0bc0 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1a3f0c30 a2=28 a3=0 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1a3f09e0 a2=50 a3=1 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit: BPF prog-id=85 op=LOAD Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff1a3f09e0 a2=94 a3=5 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit: BPF prog-id=85 op=UNLOAD Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1a3f0a90 a2=50 a3=1 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff1a3f0bb0 a2=4 a3=38 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.200000 audit[2254]: AVC avc: denied { confidentiality } for pid=2254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:52:39.200000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1a3f0c00 a2=94 a3=6 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { confidentiality } for pid=2254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:52:39.201000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1a3f03b0 a2=94 a3=88 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.201000 audit[2254]: AVC avc: denied { confidentiality } for pid=2254 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:52:39.201000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1a3f03b0 a2=94 a3=88 items=0 ppid=2144 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit: BPF prog-id=86 op=LOAD Sep 10 00:52:39.207000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff61c8d5e0 a2=98 a3=1999999999999999 items=0 ppid=2144 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.207000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 10 00:52:39.207000 audit: BPF prog-id=86 op=UNLOAD Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit: BPF prog-id=87 op=LOAD Sep 10 00:52:39.207000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff61c8d4c0 a2=94 a3=ffff items=0 ppid=2144 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.207000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 10 00:52:39.207000 audit: BPF prog-id=87 op=UNLOAD Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.207000 audit: BPF prog-id=88 op=LOAD Sep 10 00:52:39.207000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff61c8d500 a2=94 a3=7fff61c8d6e0 items=0 ppid=2144 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.207000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 10 00:52:39.207000 audit: BPF prog-id=88 op=UNLOAD Sep 10 00:52:39.250138 systemd-networkd[1034]: vxlan.calico: Link UP Sep 10 00:52:39.250146 systemd-networkd[1034]: vxlan.calico: Gained carrier Sep 10 00:52:39.252942 kubelet[1452]: E0910 00:52:39.251737 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.269000 audit: BPF prog-id=89 op=LOAD Sep 10 00:52:39.269000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd352eb7c0 a2=98 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.270000 audit: BPF prog-id=89 op=UNLOAD Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit: BPF prog-id=90 op=LOAD Sep 10 00:52:39.270000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd352eb5d0 a2=94 a3=54428f items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.270000 audit: BPF prog-id=90 op=UNLOAD Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.270000 audit: BPF prog-id=91 op=LOAD Sep 10 00:52:39.270000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd352eb600 a2=94 a3=2 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.271000 audit: BPF prog-id=91 op=UNLOAD Sep 10 00:52:39.271000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.271000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd352eb4d0 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.272000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.272000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd352eb500 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.272000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.272000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd352eb410 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.272000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.272000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd352eb520 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.272000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.272000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd352eb500 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd352eb4f0 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd352eb520 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd352eb500 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd352eb520 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd352eb4f0 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd352eb560 a2=28 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.273000 audit: BPF prog-id=92 op=LOAD Sep 10 00:52:39.273000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd352eb3d0 a2=94 a3=0 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.273000 audit: BPF prog-id=92 op=UNLOAD Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd352eb3c0 a2=50 a3=2800 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.274000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd352eb3c0 a2=50 a3=2800 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.274000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit: BPF prog-id=93 op=LOAD Sep 10 00:52:39.274000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd352eabe0 a2=94 a3=2 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.274000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.274000 audit: BPF prog-id=93 op=UNLOAD Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.274000 audit: BPF prog-id=94 op=LOAD Sep 10 00:52:39.274000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd352eace0 a2=94 a3=30 items=0 ppid=2144 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.274000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit: BPF prog-id=95 op=LOAD Sep 10 00:52:39.280000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd919b3b0 a2=98 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.280000 audit: BPF prog-id=95 op=UNLOAD Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit: BPF prog-id=96 op=LOAD Sep 10 00:52:39.280000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd919b1a0 a2=94 a3=54428f items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.280000 audit: BPF prog-id=96 op=UNLOAD Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.280000 audit: BPF prog-id=97 op=LOAD Sep 10 00:52:39.280000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd919b1d0 a2=94 a3=2 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.280000 audit: BPF prog-id=97 op=UNLOAD Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit: BPF prog-id=98 op=LOAD Sep 10 00:52:39.382000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd919b090 a2=94 a3=1 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.382000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.382000 audit: BPF prog-id=98 op=UNLOAD Sep 10 00:52:39.382000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.382000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcd919b160 a2=50 a3=7ffcd919b240 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.382000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd919b0a0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd919b0d0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd919afe0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd919b0f0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd919b0d0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd919b0c0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd919b0f0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd919b0d0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd919b0f0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd919b0c0 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd919b130 a2=28 a3=0 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd919aee0 a2=50 a3=1 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit: BPF prog-id=99 op=LOAD Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd919aee0 a2=94 a3=5 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.390000 audit: BPF prog-id=99 op=UNLOAD Sep 10 00:52:39.390000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.390000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd919af90 a2=50 a3=1 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcd919b0b0 a2=4 a3=38 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { confidentiality } for pid=2293 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd919b100 a2=94 a3=6 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { confidentiality } for pid=2293 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd919a8b0 a2=94 a3=88 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { confidentiality } for pid=2293 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd919a8b0 a2=94 a3=88 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd919c2e0 a2=10 a3=208 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd919c180 a2=10 a3=3 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd919c120 a2=10 a3=3 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.391000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:39.391000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd919c120 a2=10 a3=7 items=0 ppid=2144 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.391000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 10 00:52:39.398000 audit: BPF prog-id=94 op=UNLOAD Sep 10 00:52:39.435000 audit[2314]: NETFILTER_CFG table=nat:79 family=2 entries=15 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:52:39.435000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffea0dd8db0 a2=0 a3=7ffea0dd8d9c items=0 ppid=2144 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.435000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:52:39.436000 audit[2318]: NETFILTER_CFG table=mangle:80 family=2 entries=16 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:52:39.436000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc1e10a380 a2=0 a3=7ffc1e10a36c items=0 ppid=2144 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:52:39.436000 audit[2315]: NETFILTER_CFG table=filter:81 family=2 entries=39 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:52:39.436000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff79a492b0 a2=0 a3=7fff79a4929c items=0 ppid=2144 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:52:39.439000 audit[2313]: NETFILTER_CFG table=raw:82 family=2 entries=21 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:52:39.439000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffef843c320 a2=0 a3=7ffef843c30c items=0 ppid=2144 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:39.439000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:52:40.252535 kubelet[1452]: E0910 00:52:40.252450 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:40.883709 systemd-networkd[1034]: vxlan.calico: Gained IPv6LL Sep 10 00:52:41.068000 audit[2328]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:41.068000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdc12dc8b0 a2=0 a3=7ffdc12dc89c items=0 ppid=1685 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:41.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:41.076000 audit[2328]: NETFILTER_CFG table=nat:84 family=2 entries=24 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:41.076000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffdc12dc8b0 a2=0 a3=7ffdc12dc89c items=0 ppid=1685 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:41.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:41.253531 kubelet[1452]: E0910 00:52:41.253448 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:42.253926 kubelet[1452]: E0910 00:52:42.253881 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:42.366000 audit[2330]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:42.366000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffce3cb5290 a2=0 a3=7ffce3cb527c items=0 ppid=1685 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:42.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:42.374000 audit[2330]: NETFILTER_CFG table=nat:86 family=2 entries=36 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:42.374000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffce3cb5290 a2=0 a3=7ffce3cb527c items=0 ppid=1685 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:42.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:43.254710 kubelet[1452]: E0910 00:52:43.254661 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:43.678098 env[1212]: time="2025-09-10T00:52:43.678049311Z" level=info msg="StopPodSandbox for \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\"" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.711 [INFO][2342] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.711 [INFO][2342] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" iface="eth0" netns="/var/run/netns/cni-d149e58b-ef80-d4e7-352a-4a5d6f51734b" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.711 [INFO][2342] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" iface="eth0" netns="/var/run/netns/cni-d149e58b-ef80-d4e7-352a-4a5d6f51734b" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.712 [INFO][2342] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" iface="eth0" netns="/var/run/netns/cni-d149e58b-ef80-d4e7-352a-4a5d6f51734b" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.712 [INFO][2342] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.712 [INFO][2342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.726 [INFO][2350] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.726 [INFO][2350] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.726 [INFO][2350] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.735 [WARNING][2350] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.735 [INFO][2350] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.736 [INFO][2350] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:52:43.740194 env[1212]: 2025-09-10 00:52:43.738 [INFO][2342] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:52:43.740733 env[1212]: time="2025-09-10T00:52:43.740431735Z" level=info msg="TearDown network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\" successfully" Sep 10 00:52:43.740733 env[1212]: time="2025-09-10T00:52:43.740472274Z" level=info msg="StopPodSandbox for \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\" returns successfully" Sep 10 00:52:43.741154 env[1212]: time="2025-09-10T00:52:43.741122107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pwp6j,Uid:2bd1658b-d87b-47b3-883b-abab19e727b5,Namespace:calico-system,Attempt:1,}" Sep 10 00:52:43.741896 systemd[1]: run-netns-cni\x2dd149e58b\x2def80\x2dd4e7\x2d352a\x2d4a5d6f51734b.mount: Deactivated successfully. Sep 10 00:52:43.830702 systemd-networkd[1034]: cali6b6b5e9fe3c: Link UP Sep 10 00:52:43.833817 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 10 00:52:43.833857 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b6b5e9fe3c: link becomes ready Sep 10 00:52:43.833610 systemd-networkd[1034]: cali6b6b5e9fe3c: Gained carrier Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.782 [INFO][2359] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-csi--node--driver--pwp6j-eth0 csi-node-driver- calico-system 2bd1658b-d87b-47b3-883b-abab19e727b5 1205 0 2025-09-10 00:52:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.143 csi-node-driver-pwp6j eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6b6b5e9fe3c [] [] }} ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.782 [INFO][2359] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.802 [INFO][2373] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" HandleID="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.802 [INFO][2373] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" HandleID="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bc210), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.143", "pod":"csi-node-driver-pwp6j", "timestamp":"2025-09-10 00:52:43.802635585 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.802 [INFO][2373] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.802 [INFO][2373] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.802 [INFO][2373] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.808 [INFO][2373] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.811 [INFO][2373] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.814 [INFO][2373] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.816 [INFO][2373] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.818 [INFO][2373] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.818 [INFO][2373] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.819 [INFO][2373] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.823 [INFO][2373] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.826 [INFO][2373] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.1/26] block=192.168.66.0/26 handle="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.826 [INFO][2373] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.1/26] handle="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" host="10.0.0.143" Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.827 [INFO][2373] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:52:43.843359 env[1212]: 2025-09-10 00:52:43.827 [INFO][2373] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.1/26] IPv6=[] ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" HandleID="k8s-pod-network.af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.843958 env[1212]: 2025-09-10 00:52:43.828 [INFO][2359] cni-plugin/k8s.go 418: Populated endpoint ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--pwp6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd1658b-d87b-47b3-883b-abab19e727b5", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"csi-node-driver-pwp6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6b6b5e9fe3c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:52:43.843958 env[1212]: 2025-09-10 00:52:43.828 [INFO][2359] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.1/32] ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.843958 env[1212]: 2025-09-10 00:52:43.828 [INFO][2359] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b6b5e9fe3c ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.843958 env[1212]: 2025-09-10 00:52:43.833 [INFO][2359] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.843958 env[1212]: 2025-09-10 00:52:43.834 [INFO][2359] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--pwp6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd1658b-d87b-47b3-883b-abab19e727b5", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d", Pod:"csi-node-driver-pwp6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6b6b5e9fe3c", MAC:"1a:8c:05:4c:ca:f0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:52:43.843958 env[1212]: 2025-09-10 00:52:43.841 [INFO][2359] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d" Namespace="calico-system" Pod="csi-node-driver-pwp6j" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:52:43.853093 env[1212]: time="2025-09-10T00:52:43.853013196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 10 00:52:43.853093 env[1212]: time="2025-09-10T00:52:43.853046580Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 10 00:52:43.853311 env[1212]: time="2025-09-10T00:52:43.853079955Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 10 00:52:43.853311 env[1212]: time="2025-09-10T00:52:43.853254572Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d pid=2398 runtime=io.containerd.runc.v2 Sep 10 00:52:43.863937 systemd[1]: Started cri-containerd-af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d.scope. Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit: BPF prog-id=100 op=LOAD Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2398 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386235383466646232646662613533333263306663313838353839 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2398 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386235383466646232646662613533333263306663313838353839 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit: BPF prog-id=101 op=LOAD Sep 10 00:52:43.872000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000285310 items=0 ppid=2398 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386235383466646232646662613533333263306663313838353839 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit: BPF prog-id=102 op=LOAD Sep 10 00:52:43.872000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000285358 items=0 ppid=2398 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386235383466646232646662613533333263306663313838353839 Sep 10 00:52:43.872000 audit: BPF prog-id=102 op=UNLOAD Sep 10 00:52:43.872000 audit: BPF prog-id=101 op=UNLOAD Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:43.872000 audit: BPF prog-id=103 op=LOAD Sep 10 00:52:43.872000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000285768 items=0 ppid=2398 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166386235383466646232646662613533333263306663313838353839 Sep 10 00:52:43.873864 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 10 00:52:43.857000 audit[2395]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:52:43.857000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe2540a350 a2=0 a3=7ffe2540a33c items=0 ppid=2144 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:43.857000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:52:43.883400 env[1212]: time="2025-09-10T00:52:43.883372092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pwp6j,Uid:2bd1658b-d87b-47b3-883b-abab19e727b5,Namespace:calico-system,Attempt:1,} returns sandbox id \"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d\"" Sep 10 00:52:43.884588 env[1212]: time="2025-09-10T00:52:43.884571757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 10 00:52:44.255247 kubelet[1452]: E0910 00:52:44.255189 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:45.256145 kubelet[1452]: E0910 00:52:45.256099 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:45.447676 env[1212]: time="2025-09-10T00:52:45.447625674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:45.449596 env[1212]: time="2025-09-10T00:52:45.449571947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:45.451230 env[1212]: time="2025-09-10T00:52:45.451184167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:45.452700 env[1212]: time="2025-09-10T00:52:45.452670735Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:45.453054 env[1212]: time="2025-09-10T00:52:45.453019646Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 10 00:52:45.454651 env[1212]: time="2025-09-10T00:52:45.454631786Z" level=info msg="CreateContainer within sandbox \"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 10 00:52:45.469245 env[1212]: time="2025-09-10T00:52:45.469218896Z" level=info msg="CreateContainer within sandbox \"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"38cb0d8ec03c796e0e4b26ded8503af49094deee3e2f6a37633ee6c095a734e3\"" Sep 10 00:52:45.469574 env[1212]: time="2025-09-10T00:52:45.469521898Z" level=info msg="StartContainer for \"38cb0d8ec03c796e0e4b26ded8503af49094deee3e2f6a37633ee6c095a734e3\"" Sep 10 00:52:45.485909 systemd[1]: Started cri-containerd-38cb0d8ec03c796e0e4b26ded8503af49094deee3e2f6a37633ee6c095a734e3.scope. Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.500383 kernel: kauditd_printk_skb: 619 callbacks suppressed Sep 10 00:52:45.500432 kernel: audit: type=1400 audit(1757465565.498:673): avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f52c9f7a848 items=0 ppid=2398 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:45.508742 kernel: audit: type=1300 audit(1757465565.498:673): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f52c9f7a848 items=0 ppid=2398 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:45.508805 kernel: audit: type=1327 audit(1757465565.498:673): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338636230643865633033633739366530653462323664656438353033 Sep 10 00:52:45.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338636230643865633033633739366530653462323664656438353033 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.516648 kernel: audit: type=1400 audit(1757465565.498:674): avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.516691 kernel: audit: type=1400 audit(1757465565.498:674): avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.523682 kernel: audit: type=1400 audit(1757465565.498:674): avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.527432 kernel: audit: type=1400 audit(1757465565.498:674): avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.527557 kernel: audit: type=1400 audit(1757465565.498:674): avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.535334 kernel: audit: type=1400 audit(1757465565.498:674): avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.537026 env[1212]: time="2025-09-10T00:52:45.536963923Z" level=info msg="StartContainer for \"38cb0d8ec03c796e0e4b26ded8503af49094deee3e2f6a37633ee6c095a734e3\" returns successfully" Sep 10 00:52:45.538291 env[1212]: time="2025-09-10T00:52:45.538261068Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 10 00:52:45.539268 kernel: audit: type=1400 audit(1757465565.498:674): avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.498000 audit: BPF prog-id=104 op=LOAD Sep 10 00:52:45.498000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000255f28 items=0 ppid=2398 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:45.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338636230643865633033633739366530653462323664656438353033 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.503000 audit: BPF prog-id=105 op=LOAD Sep 10 00:52:45.503000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000255f78 items=0 ppid=2398 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:45.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338636230643865633033633739366530653462323664656438353033 Sep 10 00:52:45.508000 audit: BPF prog-id=105 op=UNLOAD Sep 10 00:52:45.508000 audit: BPF prog-id=104 op=UNLOAD Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:45.508000 audit: BPF prog-id=106 op=LOAD Sep 10 00:52:45.508000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000426008 items=0 ppid=2398 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:45.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338636230643865633033633739366530653462323664656438353033 Sep 10 00:52:45.811636 systemd-networkd[1034]: cali6b6b5e9fe3c: Gained IPv6LL Sep 10 00:52:46.256712 kubelet[1452]: E0910 00:52:46.256664 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:47.257119 kubelet[1452]: E0910 00:52:47.257075 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:47.339320 env[1212]: time="2025-09-10T00:52:47.339264112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:47.341285 env[1212]: time="2025-09-10T00:52:47.341243928Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:47.342834 env[1212]: time="2025-09-10T00:52:47.342791806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:47.344163 env[1212]: time="2025-09-10T00:52:47.344139210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:47.344554 env[1212]: time="2025-09-10T00:52:47.344528125Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 10 00:52:47.346294 env[1212]: time="2025-09-10T00:52:47.346265767Z" level=info msg="CreateContainer within sandbox \"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 10 00:52:47.358909 env[1212]: time="2025-09-10T00:52:47.358869679Z" level=info msg="CreateContainer within sandbox \"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"37064d4d13d103621671025079b80e1b60fcd2dc0b8d6818a58277e1d2a46455\"" Sep 10 00:52:47.359228 env[1212]: time="2025-09-10T00:52:47.359205744Z" level=info msg="StartContainer for \"37064d4d13d103621671025079b80e1b60fcd2dc0b8d6818a58277e1d2a46455\"" Sep 10 00:52:47.374888 systemd[1]: run-containerd-runc-k8s.io-37064d4d13d103621671025079b80e1b60fcd2dc0b8d6818a58277e1d2a46455-runc.BTpPVh.mount: Deactivated successfully. Sep 10 00:52:47.376125 systemd[1]: Started cri-containerd-37064d4d13d103621671025079b80e1b60fcd2dc0b8d6818a58277e1d2a46455.scope. Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8d50091c38 items=0 ppid=2398 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:47.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303634643464313364313033363231363731303235303739623830 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit: BPF prog-id=107 op=LOAD Sep 10 00:52:47.384000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000306e58 items=0 ppid=2398 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:47.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303634643464313364313033363231363731303235303739623830 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit: BPF prog-id=108 op=LOAD Sep 10 00:52:47.384000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000306ea8 items=0 ppid=2398 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:47.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303634643464313364313033363231363731303235303739623830 Sep 10 00:52:47.384000 audit: BPF prog-id=108 op=UNLOAD Sep 10 00:52:47.384000 audit: BPF prog-id=107 op=UNLOAD Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:47.384000 audit: BPF prog-id=109 op=LOAD Sep 10 00:52:47.384000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000306f38 items=0 ppid=2398 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:47.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337303634643464313364313033363231363731303235303739623830 Sep 10 00:52:47.395270 env[1212]: time="2025-09-10T00:52:47.395219568Z" level=info msg="StartContainer for \"37064d4d13d103621671025079b80e1b60fcd2dc0b8d6818a58277e1d2a46455\" returns successfully" Sep 10 00:52:47.685481 kubelet[1452]: I0910 00:52:47.685457 1452 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 10 00:52:47.685481 kubelet[1452]: I0910 00:52:47.685484 1452 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 10 00:52:47.862945 kubelet[1452]: I0910 00:52:47.862902 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-pwp6j" podStartSLOduration=28.401934655 podStartE2EDuration="31.86288953s" podCreationTimestamp="2025-09-10 00:52:16 +0000 UTC" firstStartedPulling="2025-09-10 00:52:43.884252241 +0000 UTC m=+28.136506432" lastFinishedPulling="2025-09-10 00:52:47.345207126 +0000 UTC m=+31.597461307" observedRunningTime="2025-09-10 00:52:47.86252445 +0000 UTC m=+32.114778641" watchObservedRunningTime="2025-09-10 00:52:47.86288953 +0000 UTC m=+32.115143721" Sep 10 00:52:48.257700 kubelet[1452]: E0910 00:52:48.257641 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:48.678212 env[1212]: time="2025-09-10T00:52:48.678175514Z" level=info msg="StopPodSandbox for \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\"" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.710 [INFO][2524] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.711 [INFO][2524] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" iface="eth0" netns="/var/run/netns/cni-bc89147a-fcef-9ac5-e971-201a52c82020" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.711 [INFO][2524] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" iface="eth0" netns="/var/run/netns/cni-bc89147a-fcef-9ac5-e971-201a52c82020" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.711 [INFO][2524] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" iface="eth0" netns="/var/run/netns/cni-bc89147a-fcef-9ac5-e971-201a52c82020" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.711 [INFO][2524] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.711 [INFO][2524] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.726 [INFO][2532] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.726 [INFO][2532] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.726 [INFO][2532] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.730 [WARNING][2532] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.730 [INFO][2532] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.731 [INFO][2532] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:52:48.733762 env[1212]: 2025-09-10 00:52:48.732 [INFO][2524] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:52:48.734184 env[1212]: time="2025-09-10T00:52:48.733933736Z" level=info msg="TearDown network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\" successfully" Sep 10 00:52:48.734184 env[1212]: time="2025-09-10T00:52:48.733962811Z" level=info msg="StopPodSandbox for \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\" returns successfully" Sep 10 00:52:48.734605 env[1212]: time="2025-09-10T00:52:48.734564764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-nnt95,Uid:5fc69035-f0dd-40e1-97ce-6557c879b47d,Namespace:default,Attempt:1,}" Sep 10 00:52:48.736651 systemd[1]: run-netns-cni\x2dbc89147a\x2dfcef\x2d9ac5\x2de971\x2d201a52c82020.mount: Deactivated successfully. Sep 10 00:52:48.824028 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 10 00:52:48.824137 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2ca3ae5c408: link becomes ready Sep 10 00:52:48.821710 systemd-networkd[1034]: cali2ca3ae5c408: Link UP Sep 10 00:52:48.824454 systemd-networkd[1034]: cali2ca3ae5c408: Gained carrier Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.771 [INFO][2539] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0 nginx-deployment-8587fbcb89- default 5fc69035-f0dd-40e1-97ce-6557c879b47d 1233 0 2025-09-10 00:52:33 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 nginx-deployment-8587fbcb89-nnt95 eth0 default [] [] [kns.default ksa.default.default] cali2ca3ae5c408 [] [] }} ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.771 [INFO][2539] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.792 [INFO][2554] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" HandleID="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.792 [INFO][2554] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" HandleID="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00050cb40), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nginx-deployment-8587fbcb89-nnt95", "timestamp":"2025-09-10 00:52:48.791988734 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.792 [INFO][2554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.792 [INFO][2554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.792 [INFO][2554] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.799 [INFO][2554] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.802 [INFO][2554] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.805 [INFO][2554] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.806 [INFO][2554] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.808 [INFO][2554] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.808 [INFO][2554] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.810 [INFO][2554] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355 Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.813 [INFO][2554] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.817 [INFO][2554] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.2/26] block=192.168.66.0/26 handle="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.817 [INFO][2554] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.2/26] handle="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" host="10.0.0.143" Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.817 [INFO][2554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:52:48.832692 env[1212]: 2025-09-10 00:52:48.817 [INFO][2554] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.2/26] IPv6=[] ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" HandleID="k8s-pod-network.9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.833247 env[1212]: 2025-09-10 00:52:48.819 [INFO][2539] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5fc69035-f0dd-40e1-97ce-6557c879b47d", ResourceVersion:"1233", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-nnt95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ca3ae5c408", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:52:48.833247 env[1212]: 2025-09-10 00:52:48.819 [INFO][2539] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.2/32] ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.833247 env[1212]: 2025-09-10 00:52:48.819 [INFO][2539] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2ca3ae5c408 ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.833247 env[1212]: 2025-09-10 00:52:48.824 [INFO][2539] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.833247 env[1212]: 2025-09-10 00:52:48.824 [INFO][2539] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5fc69035-f0dd-40e1-97ce-6557c879b47d", ResourceVersion:"1233", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355", Pod:"nginx-deployment-8587fbcb89-nnt95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ca3ae5c408", MAC:"5e:97:62:23:5a:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:52:48.833247 env[1212]: 2025-09-10 00:52:48.831 [INFO][2539] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355" Namespace="default" Pod="nginx-deployment-8587fbcb89-nnt95" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:52:48.838000 audit[2575]: NETFILTER_CFG table=filter:88 family=2 entries=42 op=nft_register_chain pid=2575 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:52:48.838000 audit[2575]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffc382a7ab0 a2=0 a3=7ffc382a7a9c items=0 ppid=2144 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:48.838000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:52:48.930360 env[1212]: time="2025-09-10T00:52:48.930239820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 10 00:52:48.930360 env[1212]: time="2025-09-10T00:52:48.930273585Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 10 00:52:48.930360 env[1212]: time="2025-09-10T00:52:48.930283504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 10 00:52:48.930620 env[1212]: time="2025-09-10T00:52:48.930570794Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355 pid=2584 runtime=io.containerd.runc.v2 Sep 10 00:52:48.942903 systemd[1]: Started cri-containerd-9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355.scope. Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit: BPF prog-id=110 op=LOAD Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:48.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962316165303963326130396138336335303531663134333566623962 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:48.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962316165303963326130396138336335303531663134333566623962 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit: BPF prog-id=111 op=LOAD Sep 10 00:52:48.951000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000269ce0 items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:48.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962316165303963326130396138336335303531663134333566623962 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit: BPF prog-id=112 op=LOAD Sep 10 00:52:48.951000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000269d28 items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:48.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962316165303963326130396138336335303531663134333566623962 Sep 10 00:52:48.951000 audit: BPF prog-id=112 op=UNLOAD Sep 10 00:52:48.951000 audit: BPF prog-id=111 op=UNLOAD Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:48.951000 audit: BPF prog-id=113 op=LOAD Sep 10 00:52:48.951000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ec138 items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:48.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962316165303963326130396138336335303531663134333566623962 Sep 10 00:52:48.952830 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 10 00:52:48.972055 env[1212]: time="2025-09-10T00:52:48.971644240Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-nnt95,Uid:5fc69035-f0dd-40e1-97ce-6557c879b47d,Namespace:default,Attempt:1,} returns sandbox id \"9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355\"" Sep 10 00:52:48.973260 env[1212]: time="2025-09-10T00:52:48.973232853Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 10 00:52:49.258626 kubelet[1452]: E0910 00:52:49.258533 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:50.164010 systemd-networkd[1034]: cali2ca3ae5c408: Gained IPv6LL Sep 10 00:52:50.258671 kubelet[1452]: E0910 00:52:50.258632 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:51.259320 kubelet[1452]: E0910 00:52:51.259264 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:51.724252 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount182523112.mount: Deactivated successfully. Sep 10 00:52:52.259569 kubelet[1452]: E0910 00:52:52.259517 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:53.217102 env[1212]: time="2025-09-10T00:52:53.217043314Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:53.218878 env[1212]: time="2025-09-10T00:52:53.218849222Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:53.220475 env[1212]: time="2025-09-10T00:52:53.220432626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:53.222014 env[1212]: time="2025-09-10T00:52:53.221985784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:52:53.222526 env[1212]: time="2025-09-10T00:52:53.222487559Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 10 00:52:53.224215 env[1212]: time="2025-09-10T00:52:53.224191973Z" level=info msg="CreateContainer within sandbox \"9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 10 00:52:53.236587 env[1212]: time="2025-09-10T00:52:53.236539239Z" level=info msg="CreateContainer within sandbox \"9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"1c86473db4fc0a9b61f35ca3ee678b205cfa1ead51a1c0eee3c0fa8bde1a0741\"" Sep 10 00:52:53.236998 env[1212]: time="2025-09-10T00:52:53.236970270Z" level=info msg="StartContainer for \"1c86473db4fc0a9b61f35ca3ee678b205cfa1ead51a1c0eee3c0fa8bde1a0741\"" Sep 10 00:52:53.252827 systemd[1]: Started cri-containerd-1c86473db4fc0a9b61f35ca3ee678b205cfa1ead51a1c0eee3c0fa8bde1a0741.scope. Sep 10 00:52:53.260089 kubelet[1452]: E0910 00:52:53.260066 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.263773 kernel: kauditd_printk_skb: 136 callbacks suppressed Sep 10 00:52:53.263820 kernel: audit: type=1400 audit(1757465573.261:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.269206 kernel: audit: type=1400 audit(1757465573.261:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.269282 kernel: audit: type=1400 audit(1757465573.261:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.271914 kernel: audit: type=1400 audit(1757465573.261:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.274636 kernel: audit: type=1400 audit(1757465573.261:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.280127 kernel: audit: type=1400 audit(1757465573.261:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.280174 kernel: audit: type=1400 audit(1757465573.261:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.282852 kernel: audit: type=1400 audit(1757465573.261:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.288284 kernel: audit: type=1400 audit(1757465573.261:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.288328 kernel: audit: type=1400 audit(1757465573.264:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.264000 audit: BPF prog-id=114 op=LOAD Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2584 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:53.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383634373364623466633061396236316633356361336565363738 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2584 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:53.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383634373364623466633061396236316633356361336565363738 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.265000 audit: BPF prog-id=115 op=LOAD Sep 10 00:52:53.265000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000303dc0 items=0 ppid=2584 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:53.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383634373364623466633061396236316633356361336565363738 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.273000 audit: BPF prog-id=116 op=LOAD Sep 10 00:52:53.273000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000303e08 items=0 ppid=2584 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:53.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383634373364623466633061396236316633356361336565363738 Sep 10 00:52:53.275000 audit: BPF prog-id=116 op=UNLOAD Sep 10 00:52:53.275000 audit: BPF prog-id=115 op=UNLOAD Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:53.275000 audit: BPF prog-id=117 op=LOAD Sep 10 00:52:53.275000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000362218 items=0 ppid=2584 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:53.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383634373364623466633061396236316633356361336565363738 Sep 10 00:52:53.302084 env[1212]: time="2025-09-10T00:52:53.301983318Z" level=info msg="StartContainer for \"1c86473db4fc0a9b61f35ca3ee678b205cfa1ead51a1c0eee3c0fa8bde1a0741\" returns successfully" Sep 10 00:52:53.758207 kubelet[1452]: I0910 00:52:53.758162 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-nnt95" podStartSLOduration=16.507578437 podStartE2EDuration="20.758146659s" podCreationTimestamp="2025-09-10 00:52:33 +0000 UTC" firstStartedPulling="2025-09-10 00:52:48.972770086 +0000 UTC m=+33.225024277" lastFinishedPulling="2025-09-10 00:52:53.223338308 +0000 UTC m=+37.475592499" observedRunningTime="2025-09-10 00:52:53.758058481 +0000 UTC m=+38.010312662" watchObservedRunningTime="2025-09-10 00:52:53.758146659 +0000 UTC m=+38.010400850" Sep 10 00:52:54.233354 systemd[1]: run-containerd-runc-k8s.io-1c86473db4fc0a9b61f35ca3ee678b205cfa1ead51a1c0eee3c0fa8bde1a0741-runc.l8k9Vo.mount: Deactivated successfully. Sep 10 00:52:54.260627 kubelet[1452]: E0910 00:52:54.260590 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:54.692264 update_engine[1208]: I0910 00:52:54.692221 1208 update_attempter.cc:509] Updating boot flags... Sep 10 00:52:55.261091 kubelet[1452]: E0910 00:52:55.261052 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:56.236443 kubelet[1452]: E0910 00:52:56.236393 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:56.262026 kubelet[1452]: E0910 00:52:56.261997 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:56.705000 audit[2700]: NETFILTER_CFG table=filter:89 family=2 entries=22 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:56.705000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffe1e521820 a2=0 a3=7ffe1e52180c items=0 ppid=1685 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:56.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:56.713000 audit[2700]: NETFILTER_CFG table=nat:90 family=2 entries=24 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:56.713000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffe1e521820 a2=0 a3=0 items=0 ppid=1685 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:56.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:56.727000 audit[2702]: NETFILTER_CFG table=filter:91 family=2 entries=34 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:56.727000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffd998ffd20 a2=0 a3=7ffd998ffd0c items=0 ppid=1685 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:56.727000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:56.732000 audit[2702]: NETFILTER_CFG table=nat:92 family=2 entries=24 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:52:56.732000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffd998ffd20 a2=0 a3=0 items=0 ppid=1685 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:56.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:52:56.764299 systemd[1]: Created slice kubepods-besteffort-podf5b13539_d7b3_4265_84f6_9192eebd7464.slice. Sep 10 00:52:56.865703 kubelet[1452]: I0910 00:52:56.865676 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sk95s\" (UniqueName: \"kubernetes.io/projected/f5b13539-d7b3-4265-84f6-9192eebd7464-kube-api-access-sk95s\") pod \"nfs-server-provisioner-0\" (UID: \"f5b13539-d7b3-4265-84f6-9192eebd7464\") " pod="default/nfs-server-provisioner-0" Sep 10 00:52:56.865783 kubelet[1452]: I0910 00:52:56.865704 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f5b13539-d7b3-4265-84f6-9192eebd7464-data\") pod \"nfs-server-provisioner-0\" (UID: \"f5b13539-d7b3-4265-84f6-9192eebd7464\") " pod="default/nfs-server-provisioner-0" Sep 10 00:52:57.067005 env[1212]: time="2025-09-10T00:52:57.066895093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f5b13539-d7b3-4265-84f6-9192eebd7464,Namespace:default,Attempt:0,}" Sep 10 00:52:57.161538 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 10 00:52:57.161660 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 10 00:52:57.160565 systemd-networkd[1034]: cali60e51b789ff: Link UP Sep 10 00:52:57.160720 systemd-networkd[1034]: cali60e51b789ff: Gained carrier Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.107 [INFO][2705] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f5b13539-d7b3-4265-84f6-9192eebd7464 1276 0 2025-09-10 00:52:56 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.143 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.107 [INFO][2705] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.126 [INFO][2719] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" HandleID="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.126 [INFO][2719] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" HandleID="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003af350), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-10 00:52:57.126081757 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.126 [INFO][2719] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.126 [INFO][2719] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.126 [INFO][2719] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.133 [INFO][2719] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.137 [INFO][2719] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.140 [INFO][2719] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.144 [INFO][2719] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.147 [INFO][2719] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.147 [INFO][2719] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.148 [INFO][2719] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11 Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.151 [INFO][2719] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.155 [INFO][2719] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.3/26] block=192.168.66.0/26 handle="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.155 [INFO][2719] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.3/26] handle="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" host="10.0.0.143" Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.155 [INFO][2719] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:52:57.174128 env[1212]: 2025-09-10 00:52:57.155 [INFO][2719] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.3/26] IPv6=[] ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" HandleID="k8s-pod-network.23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Sep 10 00:52:57.174736 env[1212]: 2025-09-10 00:52:57.156 [INFO][2705] cni-plugin/k8s.go 418: Populated endpoint ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f5b13539-d7b3-4265-84f6-9192eebd7464", ResourceVersion:"1276", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:52:57.174736 env[1212]: 2025-09-10 00:52:57.156 [INFO][2705] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.3/32] ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Sep 10 00:52:57.174736 env[1212]: 2025-09-10 00:52:57.156 [INFO][2705] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Sep 10 00:52:57.174736 env[1212]: 2025-09-10 00:52:57.165 [INFO][2705] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Sep 10 00:52:57.174917 env[1212]: 2025-09-10 00:52:57.166 [INFO][2705] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f5b13539-d7b3-4265-84f6-9192eebd7464", ResourceVersion:"1276", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e6:1c:4d:42:bb:79", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:52:57.174917 env[1212]: 2025-09-10 00:52:57.172 [INFO][2705] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Sep 10 00:52:57.184746 env[1212]: time="2025-09-10T00:52:57.182148401Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 10 00:52:57.184746 env[1212]: time="2025-09-10T00:52:57.182193316Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 10 00:52:57.184746 env[1212]: time="2025-09-10T00:52:57.182202733Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 10 00:52:57.184746 env[1212]: time="2025-09-10T00:52:57.182325156Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11 pid=2742 runtime=io.containerd.runc.v2 Sep 10 00:52:57.188000 audit[2751]: NETFILTER_CFG table=filter:93 family=2 entries=46 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:52:57.188000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7ffd24391580 a2=0 a3=7ffd2439156c items=0 ppid=2144 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:57.188000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:52:57.199165 systemd[1]: Started cri-containerd-23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11.scope. Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.206000 audit: BPF prog-id=118 op=LOAD Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2742 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:57.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353336623030343137363039313236663330636235323132656164 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2742 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:57.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353336623030343137363039313236663330636235323132656164 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit: BPF prog-id=119 op=LOAD Sep 10 00:52:57.207000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002a5e10 items=0 ppid=2742 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:57.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353336623030343137363039313236663330636235323132656164 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit: BPF prog-id=120 op=LOAD Sep 10 00:52:57.207000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002a5e58 items=0 ppid=2742 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:57.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353336623030343137363039313236663330636235323132656164 Sep 10 00:52:57.207000 audit: BPF prog-id=120 op=UNLOAD Sep 10 00:52:57.207000 audit: BPF prog-id=119 op=UNLOAD Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { perfmon } for pid=2752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit[2752]: AVC avc: denied { bpf } for pid=2752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:52:57.207000 audit: BPF prog-id=121 op=LOAD Sep 10 00:52:57.207000 audit[2752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00030c268 items=0 ppid=2742 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:52:57.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353336623030343137363039313236663330636235323132656164 Sep 10 00:52:57.209295 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 10 00:52:57.231375 env[1212]: time="2025-09-10T00:52:57.231331605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f5b13539-d7b3-4265-84f6-9192eebd7464,Namespace:default,Attempt:0,} returns sandbox id \"23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11\"" Sep 10 00:52:57.232798 env[1212]: time="2025-09-10T00:52:57.232776005Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 10 00:52:57.262098 kubelet[1452]: E0910 00:52:57.262062 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:58.227707 systemd-networkd[1034]: cali60e51b789ff: Gained IPv6LL Sep 10 00:52:58.262194 kubelet[1452]: E0910 00:52:58.262157 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:52:59.144209 systemd[1]: run-containerd-runc-k8s.io-ccba3309929cfbf353d1d9d6f702fc8264582fa7f5b20939185b27e8ce676775-runc.piy3i5.mount: Deactivated successfully. Sep 10 00:52:59.262523 kubelet[1452]: E0910 00:52:59.262474 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:00.262774 kubelet[1452]: E0910 00:53:00.262702 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:00.538095 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3946082313.mount: Deactivated successfully. Sep 10 00:53:01.263798 kubelet[1452]: E0910 00:53:01.263761 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:02.264514 kubelet[1452]: E0910 00:53:02.264456 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:02.752533 env[1212]: time="2025-09-10T00:53:02.752476651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:02.754107 env[1212]: time="2025-09-10T00:53:02.754083018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:02.755809 env[1212]: time="2025-09-10T00:53:02.755745503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:02.757195 env[1212]: time="2025-09-10T00:53:02.757164336Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:02.757693 env[1212]: time="2025-09-10T00:53:02.757669932Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 10 00:53:02.759794 env[1212]: time="2025-09-10T00:53:02.759749885Z" level=info msg="CreateContainer within sandbox \"23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 10 00:53:02.773006 env[1212]: time="2025-09-10T00:53:02.772954809Z" level=info msg="CreateContainer within sandbox \"23536b00417609126f30cb5212ead74055b399a4c55562185bfcba1b6b8dbf11\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"11192a83c7e4c6aed9a19c134e78d695f631f03596b8559fad679713bd508a41\"" Sep 10 00:53:02.773349 env[1212]: time="2025-09-10T00:53:02.773321082Z" level=info msg="StartContainer for \"11192a83c7e4c6aed9a19c134e78d695f631f03596b8559fad679713bd508a41\"" Sep 10 00:53:02.791922 systemd[1]: Started cri-containerd-11192a83c7e4c6aed9a19c134e78d695f631f03596b8559fad679713bd508a41.scope. Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.801889 kernel: kauditd_printk_skb: 119 callbacks suppressed Sep 10 00:53:02.801960 kernel: audit: type=1400 audit(1757465582.799:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.807601 kernel: audit: type=1400 audit(1757465582.799:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.807642 kernel: audit: type=1400 audit(1757465582.799:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.810301 kernel: audit: type=1400 audit(1757465582.799:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.815874 kernel: audit: type=1400 audit(1757465582.799:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.815922 kernel: audit: type=1400 audit(1757465582.799:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.821344 kernel: audit: type=1400 audit(1757465582.799:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.821390 kernel: audit: type=1400 audit(1757465582.799:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.826832 kernel: audit: type=1400 audit(1757465582.799:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.826878 kernel: audit: type=1400 audit(1757465582.799:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit: BPF prog-id=122 op=LOAD Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2742 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:02.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313932613833633765346336616564396131396331333465373864 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2742 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:02.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313932613833633765346336616564396131396331333465373864 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.799000 audit: BPF prog-id=123 op=LOAD Sep 10 00:53:02.799000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000203540 items=0 ppid=2742 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:02.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313932613833633765346336616564396131396331333465373864 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.800000 audit: BPF prog-id=124 op=LOAD Sep 10 00:53:02.800000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000203588 items=0 ppid=2742 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:02.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313932613833633765346336616564396131396331333465373864 Sep 10 00:53:02.806000 audit: BPF prog-id=124 op=UNLOAD Sep 10 00:53:02.806000 audit: BPF prog-id=123 op=UNLOAD Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { perfmon } for pid=2813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit[2813]: AVC avc: denied { bpf } for pid=2813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:02.806000 audit: BPF prog-id=125 op=LOAD Sep 10 00:53:02.806000 audit[2813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000203998 items=0 ppid=2742 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:02.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313932613833633765346336616564396131396331333465373864 Sep 10 00:53:02.834734 env[1212]: time="2025-09-10T00:53:02.834670308Z" level=info msg="StartContainer for \"11192a83c7e4c6aed9a19c134e78d695f631f03596b8559fad679713bd508a41\" returns successfully" Sep 10 00:53:02.870000 audit[2842]: AVC avc: denied { search } for pid=2842 comm="rpcbind" name="crypto" dev="proc" ino=23127 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 10 00:53:02.870000 audit[2842]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f15c39ec0c0 a2=0 a3=0 items=0 ppid=2823 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 key=(null) Sep 10 00:53:02.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 10 00:53:02.900000 audit[2847]: AVC avc: denied { search } for pid=2847 comm="dbus-daemon" name="crypto" dev="proc" ino=23127 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 10 00:53:02.900000 audit[2847]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f03a07880c0 a2=0 a3=0 items=0 ppid=2823 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 key=(null) Sep 10 00:53:02.900000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 10 00:53:02.902000 audit[2848]: AVC avc: denied { watch } for pid=2848 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c586,c899 tclass=dir permissive=0 Sep 10 00:53:02.902000 audit[2848]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55eeab0eeec0 a2=2c8 a3=7ffcadf781dc items=0 ppid=2823 pid=2848 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 key=(null) Sep 10 00:53:02.902000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 10 00:53:02.905000 audit[2849]: AVC avc: denied { read } for pid=2849 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23152 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 10 00:53:02.905000 audit[2849]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fdd1ce02320 a1=80000 a2=d a3=7ffefd4c17c0 items=0 ppid=2823 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 key=(null) Sep 10 00:53:02.905000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 10 00:53:02.905000 audit[2849]: AVC avc: denied { search } for pid=2849 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23127 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 10 00:53:02.905000 audit[2849]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdd1c3560c0 a2=0 a3=0 items=0 ppid=2823 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c899 key=(null) Sep 10 00:53:02.905000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 10 00:53:03.265036 kubelet[1452]: E0910 00:53:03.264985 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:03.777966 kubelet[1452]: I0910 00:53:03.777913 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.251790556 podStartE2EDuration="7.777896057s" podCreationTimestamp="2025-09-10 00:52:56 +0000 UTC" firstStartedPulling="2025-09-10 00:52:57.232365967 +0000 UTC m=+41.484620158" lastFinishedPulling="2025-09-10 00:53:02.758471468 +0000 UTC m=+47.010725659" observedRunningTime="2025-09-10 00:53:03.777823189 +0000 UTC m=+48.030077380" watchObservedRunningTime="2025-09-10 00:53:03.777896057 +0000 UTC m=+48.030150248" Sep 10 00:53:03.785000 audit[2868]: NETFILTER_CFG table=filter:94 family=2 entries=22 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:53:03.785000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdfdc32a50 a2=0 a3=7ffdfdc32a3c items=0 ppid=1685 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:03.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:53:03.792000 audit[2868]: NETFILTER_CFG table=nat:95 family=2 entries=108 op=nft_register_chain pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:53:03.792000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=50220 a0=3 a1=7ffdfdc32a50 a2=0 a3=7ffdfdc32a3c items=0 ppid=1685 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:03.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:53:04.265241 kubelet[1452]: E0910 00:53:04.265199 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:05.266369 kubelet[1452]: E0910 00:53:05.266315 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:06.267055 kubelet[1452]: E0910 00:53:06.267013 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:07.267758 kubelet[1452]: E0910 00:53:07.267704 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:08.268705 kubelet[1452]: E0910 00:53:08.268649 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:09.268777 kubelet[1452]: E0910 00:53:09.268732 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:10.269297 kubelet[1452]: E0910 00:53:10.269255 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:11.112000 audit[2877]: NETFILTER_CFG table=filter:96 family=2 entries=9 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:53:11.117434 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 10 00:53:11.117569 kernel: audit: type=1325 audit(1757465591.112:770): table=filter:96 family=2 entries=9 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:53:11.117595 kernel: audit: type=1300 audit(1757465591.112:770): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff51ab0d90 a2=0 a3=7fff51ab0d7c items=0 ppid=1685 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:11.112000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff51ab0d90 a2=0 a3=7fff51ab0d7c items=0 ppid=1685 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:11.121765 kernel: audit: type=1327 audit(1757465591.112:770): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:53:11.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:53:11.129000 audit[2877]: NETFILTER_CFG table=nat:97 family=2 entries=55 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:53:11.129000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=20100 a0=3 a1=7fff51ab0d90 a2=0 a3=7fff51ab0d7c items=0 ppid=1685 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:11.137349 kernel: audit: type=1325 audit(1757465591.129:771): table=nat:97 family=2 entries=55 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 10 00:53:11.137391 kernel: audit: type=1300 audit(1757465591.129:771): arch=c000003e syscall=46 success=yes exit=20100 a0=3 a1=7fff51ab0d90 a2=0 a3=7fff51ab0d7c items=0 ppid=1685 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:11.137414 kernel: audit: type=1327 audit(1757465591.129:771): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:53:11.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 10 00:53:11.270210 kubelet[1452]: E0910 00:53:11.270176 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:12.270508 kubelet[1452]: E0910 00:53:12.270448 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:12.624128 systemd[1]: Created slice kubepods-besteffort-pod94fba2c3_57bc_48e9_9aa1_086cfb619a94.slice. Sep 10 00:53:12.645664 kubelet[1452]: I0910 00:53:12.645623 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-7e70318e-d3c4-44e5-b270-86e9d5bee696\" (UniqueName: \"kubernetes.io/nfs/94fba2c3-57bc-48e9-9aa1-086cfb619a94-pvc-7e70318e-d3c4-44e5-b270-86e9d5bee696\") pod \"test-pod-1\" (UID: \"94fba2c3-57bc-48e9-9aa1-086cfb619a94\") " pod="default/test-pod-1" Sep 10 00:53:12.645664 kubelet[1452]: I0910 00:53:12.645657 1452 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vhl45\" (UniqueName: \"kubernetes.io/projected/94fba2c3-57bc-48e9-9aa1-086cfb619a94-kube-api-access-vhl45\") pod \"test-pod-1\" (UID: \"94fba2c3-57bc-48e9-9aa1-086cfb619a94\") " pod="default/test-pod-1" Sep 10 00:53:12.753000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.760190 kernel: Failed to create system directory netfs Sep 10 00:53:12.760240 kernel: audit: type=1400 audit(1757465592.753:772): avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.760259 kernel: Failed to create system directory netfs Sep 10 00:53:12.760274 kernel: audit: type=1400 audit(1757465592.753:772): avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.753000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.753000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.765058 kernel: Failed to create system directory netfs Sep 10 00:53:12.765095 kernel: audit: type=1400 audit(1757465592.753:772): avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.765111 kernel: Failed to create system directory netfs Sep 10 00:53:12.768381 kernel: audit: type=1400 audit(1757465592.753:772): avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.753000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.753000 audit[2881]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c07a9ba5e0 a1=153bc a2=55c070a2c2b0 a3=5 items=0 ppid=61 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:12.753000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.780980 kernel: Failed to create system directory fscache Sep 10 00:53:12.781082 kernel: Failed to create system directory fscache Sep 10 00:53:12.781100 kernel: Failed to create system directory fscache Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.783087 kernel: Failed to create system directory fscache Sep 10 00:53:12.783111 kernel: Failed to create system directory fscache Sep 10 00:53:12.783126 kernel: Failed to create system directory fscache Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.784696 kernel: Failed to create system directory fscache Sep 10 00:53:12.784736 kernel: Failed to create system directory fscache Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.786133 kernel: Failed to create system directory fscache Sep 10 00:53:12.786188 kernel: Failed to create system directory fscache Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.787643 kernel: Failed to create system directory fscache Sep 10 00:53:12.787689 kernel: Failed to create system directory fscache Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.789125 kernel: Failed to create system directory fscache Sep 10 00:53:12.789155 kernel: Failed to create system directory fscache Sep 10 00:53:12.775000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.791522 kernel: FS-Cache: Loaded Sep 10 00:53:12.775000 audit[2881]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c07abcf9c0 a1=4c0fc a2=55c070a2c2b0 a3=5 items=0 ppid=61 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:12.775000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.821082 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.821129 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.821144 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.823121 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.823140 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.823161 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.825181 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.825213 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.825233 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.826537 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.826563 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.827919 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.827937 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.829959 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.829986 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.830004 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.832055 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.832074 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.832087 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.834099 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.834117 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.834134 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.834793 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.837004 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.837033 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.837049 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.837782 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.839146 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.839177 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.840520 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.840539 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.841878 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.841901 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.843926 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.843951 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.843966 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.845982 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.846004 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.846025 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.848037 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.848069 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.848082 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.850097 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.850123 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.850139 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.850784 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.852130 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.852156 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.854177 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.854195 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.854211 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.855547 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.855575 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.856910 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.856962 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.857616 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.858964 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.858989 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.861024 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.861048 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.861061 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.863072 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.863090 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.863103 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.865128 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.865151 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.865164 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.867175 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.867200 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.867217 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.868556 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.868580 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.869924 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.869950 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.871981 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.872005 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.872021 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.874033 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.874057 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.874070 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.876303 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.876369 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.878089 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.878126 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.880140 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.880167 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.880183 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.881519 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.881542 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.882871 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.882904 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.884916 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.884947 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.884966 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.886984 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.887005 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.887024 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.889035 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.889063 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.889080 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.891080 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.891107 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.891123 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.893147 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.893170 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.893192 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.894524 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.894552 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.895895 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.895927 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.897942 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.897982 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.897999 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.899978 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.899999 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.900013 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.902027 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.902049 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.902099 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.904066 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.904093 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.904110 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.906113 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.906151 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.906167 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.809000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.907522 kernel: Failed to create system directory sunrpc Sep 10 00:53:12.917957 kernel: RPC: Registered named UNIX socket transport module. Sep 10 00:53:12.917991 kernel: RPC: Registered udp transport module. Sep 10 00:53:12.918027 kernel: RPC: Registered tcp transport module. Sep 10 00:53:12.918044 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 10 00:53:12.809000 audit[2881]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c07ac1bad0 a1=1a81bc a2=55c070a2c2b0 a3=5 items=6 ppid=61 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:12.809000 audit: CWD cwd="/" Sep 10 00:53:12.809000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:53:12.809000 audit: PATH item=1 name=(null) inode=23933 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:53:12.809000 audit: PATH item=2 name=(null) inode=23933 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:53:12.809000 audit: PATH item=3 name=(null) inode=23934 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:53:12.809000 audit: PATH item=4 name=(null) inode=23933 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:53:12.809000 audit: PATH item=5 name=(null) inode=23935 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 10 00:53:12.809000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.951666 kernel: Failed to create system directory nfs Sep 10 00:53:12.951689 kernel: Failed to create system directory nfs Sep 10 00:53:12.951715 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.952965 kernel: Failed to create system directory nfs Sep 10 00:53:12.952987 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.954912 kernel: Failed to create system directory nfs Sep 10 00:53:12.954933 kernel: Failed to create system directory nfs Sep 10 00:53:12.954946 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.956865 kernel: Failed to create system directory nfs Sep 10 00:53:12.956886 kernel: Failed to create system directory nfs Sep 10 00:53:12.956899 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.957521 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.958810 kernel: Failed to create system directory nfs Sep 10 00:53:12.958829 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.960105 kernel: Failed to create system directory nfs Sep 10 00:53:12.960132 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.962047 kernel: Failed to create system directory nfs Sep 10 00:53:12.962068 kernel: Failed to create system directory nfs Sep 10 00:53:12.962082 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.964001 kernel: Failed to create system directory nfs Sep 10 00:53:12.964022 kernel: Failed to create system directory nfs Sep 10 00:53:12.964035 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.965944 kernel: Failed to create system directory nfs Sep 10 00:53:12.965972 kernel: Failed to create system directory nfs Sep 10 00:53:12.965986 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.967899 kernel: Failed to create system directory nfs Sep 10 00:53:12.967921 kernel: Failed to create system directory nfs Sep 10 00:53:12.967935 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.969844 kernel: Failed to create system directory nfs Sep 10 00:53:12.969865 kernel: Failed to create system directory nfs Sep 10 00:53:12.969887 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.971136 kernel: Failed to create system directory nfs Sep 10 00:53:12.971156 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.973123 kernel: Failed to create system directory nfs Sep 10 00:53:12.973149 kernel: Failed to create system directory nfs Sep 10 00:53:12.973163 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.975117 kernel: Failed to create system directory nfs Sep 10 00:53:12.975138 kernel: Failed to create system directory nfs Sep 10 00:53:12.975158 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.977120 kernel: Failed to create system directory nfs Sep 10 00:53:12.977140 kernel: Failed to create system directory nfs Sep 10 00:53:12.977154 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.979083 kernel: Failed to create system directory nfs Sep 10 00:53:12.979102 kernel: Failed to create system directory nfs Sep 10 00:53:12.979116 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.981041 kernel: Failed to create system directory nfs Sep 10 00:53:12.981068 kernel: Failed to create system directory nfs Sep 10 00:53:12.981083 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.982996 kernel: Failed to create system directory nfs Sep 10 00:53:12.983015 kernel: Failed to create system directory nfs Sep 10 00:53:12.983029 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.985000 kernel: Failed to create system directory nfs Sep 10 00:53:12.985019 kernel: Failed to create system directory nfs Sep 10 00:53:12.985031 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.987006 kernel: Failed to create system directory nfs Sep 10 00:53:12.987024 kernel: Failed to create system directory nfs Sep 10 00:53:12.987038 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:12.989045 kernel: Failed to create system directory nfs Sep 10 00:53:12.989070 kernel: Failed to create system directory nfs Sep 10 00:53:12.989085 kernel: Failed to create system directory nfs Sep 10 00:53:12.943000 audit[2881]: AVC avc: denied { confidentiality } for pid=2881 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.010542 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 10 00:53:12.943000 audit[2881]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c07ae3caf0 a1=16ea0c a2=55c070a2c2b0 a3=5 items=0 ppid=61 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:12.943000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.046117 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.046167 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.046182 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.048179 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.048220 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.048236 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.049544 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.049566 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.050874 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.050894 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.052860 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.052879 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.052891 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.054898 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.054929 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.054943 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.056924 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.056955 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.056969 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.058946 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.058968 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.058980 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.060972 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.060989 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.061009 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.063000 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.063020 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.063039 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.065027 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.065054 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.065068 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.067051 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.067072 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.067092 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.069078 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.069100 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.069113 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.071115 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.071156 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.071172 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.073154 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.073174 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.073194 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.074521 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.074543 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.075891 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.075910 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.077923 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.077955 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.077969 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.079934 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.079977 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.079991 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.081952 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.081972 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.081985 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.083974 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.084007 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.084021 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.086004 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.086035 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.086048 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.087989 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.088011 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.088025 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.090062 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.090097 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.090110 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.092106 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.092130 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.092148 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.094121 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.094148 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.094164 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.096153 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.096173 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.096191 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.098158 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.098178 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.098190 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.100152 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.100179 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.100193 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.101514 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.101534 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.102857 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.102879 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.104893 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.104947 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.104964 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.106926 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.106949 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.106962 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.034000 audit[2886]: AVC avc: denied { confidentiality } for pid=2886 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.108510 kernel: Failed to create system directory nfs4 Sep 10 00:53:13.247754 kernel: NFS: Registering the id_resolver key type Sep 10 00:53:13.247807 kernel: Key type id_resolver registered Sep 10 00:53:13.247844 kernel: Key type id_legacy registered Sep 10 00:53:13.034000 audit[2886]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1a0ba6a010 a1=20955c a2=55cef0b472b0 a3=5 items=0 ppid=61 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.034000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.259096 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.259136 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.259153 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.261142 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.261165 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.261181 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.262521 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.262544 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.263883 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.263901 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.265941 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.265978 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.265992 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.268009 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.268040 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.268054 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.270064 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.270082 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.270102 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.271213 kubelet[1452]: E0910 00:53:13.271177 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.272121 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.272141 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.272154 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.273513 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.273532 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.274880 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.274904 kernel: Failed to create system directory rpcgss Sep 10 00:53:13.254000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 10 00:53:13.254000 audit[2887]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa56ea4c010 a1=70bac a2=55cdab2f72b0 a3=5 items=0 ppid=61 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.254000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 10 00:53:13.286743 nfsidmap[2895]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 10 00:53:13.289005 nfsidmap[2898]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 10 00:53:13.293000 audit[1278]: AVC avc: denied { watch_reads } for pid=1278 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 10 00:53:13.293000 audit[1278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555ed6597960 a2=10 a3=45c5c645db772ea5 items=0 ppid=1 pid=1278 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.293000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 10 00:53:13.293000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 10 00:53:13.293000 audit[1278]: AVC avc: denied { watch_reads } for pid=1278 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 10 00:53:13.293000 audit[1278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555ed6597960 a2=10 a3=45c5c645db772ea5 items=0 ppid=1 pid=1278 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.293000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 10 00:53:13.293000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 10 00:53:13.293000 audit[1278]: AVC avc: denied { watch_reads } for pid=1278 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 10 00:53:13.293000 audit[1278]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555ed6597960 a2=10 a3=45c5c645db772ea5 items=0 ppid=1 pid=1278 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.293000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 10 00:53:13.293000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 10 00:53:13.526742 env[1212]: time="2025-09-10T00:53:13.526659818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:94fba2c3-57bc-48e9-9aa1-086cfb619a94,Namespace:default,Attempt:0,}" Sep 10 00:53:13.613738 systemd-networkd[1034]: cali5ec59c6bf6e: Link UP Sep 10 00:53:13.616649 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 10 00:53:13.616699 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 10 00:53:13.616672 systemd-networkd[1034]: cali5ec59c6bf6e: Gained carrier Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.562 [INFO][2901] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-test--pod--1-eth0 default 94fba2c3-57bc-48e9-9aa1-086cfb619a94 1355 0 2025-09-10 00:52:57 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.563 [INFO][2901] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.581 [INFO][2915] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" HandleID="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Workload="10.0.0.143-k8s-test--pod--1-eth0" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.581 [INFO][2915] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" HandleID="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Workload="10.0.0.143-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f730), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"test-pod-1", "timestamp":"2025-09-10 00:53:13.581321474 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.581 [INFO][2915] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.581 [INFO][2915] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.581 [INFO][2915] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.587 [INFO][2915] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.590 [INFO][2915] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.593 [INFO][2915] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.595 [INFO][2915] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.597 [INFO][2915] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.597 [INFO][2915] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.598 [INFO][2915] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.601 [INFO][2915] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.608 [INFO][2915] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.4/26] block=192.168.66.0/26 handle="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.608 [INFO][2915] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.4/26] handle="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" host="10.0.0.143" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.608 [INFO][2915] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.608 [INFO][2915] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.4/26] IPv6=[] ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" HandleID="k8s-pod-network.dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Workload="10.0.0.143-k8s-test--pod--1-eth0" Sep 10 00:53:13.625147 env[1212]: 2025-09-10 00:53:13.610 [INFO][2901] cni-plugin/k8s.go 418: Populated endpoint ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"94fba2c3-57bc-48e9-9aa1-086cfb619a94", ResourceVersion:"1355", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:53:13.625745 env[1212]: 2025-09-10 00:53:13.610 [INFO][2901] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.4/32] ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Sep 10 00:53:13.625745 env[1212]: 2025-09-10 00:53:13.610 [INFO][2901] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Sep 10 00:53:13.625745 env[1212]: 2025-09-10 00:53:13.617 [INFO][2901] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Sep 10 00:53:13.625745 env[1212]: 2025-09-10 00:53:13.617 [INFO][2901] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"94fba2c3-57bc-48e9-9aa1-086cfb619a94", ResourceVersion:"1355", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0e:25:0c:a3:e2:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:53:13.625745 env[1212]: 2025-09-10 00:53:13.622 [INFO][2901] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Sep 10 00:53:13.632000 audit[2933]: NETFILTER_CFG table=filter:98 family=2 entries=36 op=nft_register_chain pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 10 00:53:13.632000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffd2931a860 a2=0 a3=7ffd2931a84c items=0 ppid=2144 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.632000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 10 00:53:13.637000 env[1212]: time="2025-09-10T00:53:13.636945964Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 10 00:53:13.637000 env[1212]: time="2025-09-10T00:53:13.636978196Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 10 00:53:13.637000 env[1212]: time="2025-09-10T00:53:13.636987974Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 10 00:53:13.637177 env[1212]: time="2025-09-10T00:53:13.637126936Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf pid=2941 runtime=io.containerd.runc.v2 Sep 10 00:53:13.646210 systemd[1]: Started cri-containerd-dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf.scope. Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit: BPF prog-id=126 op=LOAD Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2941 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323233393763656163383436343231383930613832323831626163 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2941 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323233393763656163383436343231383930613832323831626163 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.654000 audit: BPF prog-id=127 op=LOAD Sep 10 00:53:13.654000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031fb20 items=0 ppid=2941 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323233393763656163383436343231383930613832323831626163 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit: BPF prog-id=128 op=LOAD Sep 10 00:53:13.655000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031fb68 items=0 ppid=2941 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323233393763656163383436343231383930613832323831626163 Sep 10 00:53:13.655000 audit: BPF prog-id=128 op=UNLOAD Sep 10 00:53:13.655000 audit: BPF prog-id=127 op=UNLOAD Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:13.655000 audit: BPF prog-id=129 op=LOAD Sep 10 00:53:13.655000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031ff78 items=0 ppid=2941 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:13.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323233393763656163383436343231383930613832323831626163 Sep 10 00:53:13.657223 systemd-resolved[1151]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 10 00:53:13.676005 env[1212]: time="2025-09-10T00:53:13.675959714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:94fba2c3-57bc-48e9-9aa1-086cfb619a94,Namespace:default,Attempt:0,} returns sandbox id \"dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf\"" Sep 10 00:53:13.677779 env[1212]: time="2025-09-10T00:53:13.677761528Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 10 00:53:14.180019 env[1212]: time="2025-09-10T00:53:14.179987013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:14.181733 env[1212]: time="2025-09-10T00:53:14.181692013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:14.183345 env[1212]: time="2025-09-10T00:53:14.183322022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:14.185018 env[1212]: time="2025-09-10T00:53:14.184970576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 10 00:53:14.185459 env[1212]: time="2025-09-10T00:53:14.185435161Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 10 00:53:14.187279 env[1212]: time="2025-09-10T00:53:14.187250608Z" level=info msg="CreateContainer within sandbox \"dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 10 00:53:14.198645 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1231817787.mount: Deactivated successfully. Sep 10 00:53:14.201314 env[1212]: time="2025-09-10T00:53:14.201271054Z" level=info msg="CreateContainer within sandbox \"dc22397ceac846421890a82281bac546d87e669d08cc019eadcb8344e6cc55cf\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"717ce74c14e06c520b9a7608d42852c0887853d5c1b622203d83653b49681b4b\"" Sep 10 00:53:14.201647 env[1212]: time="2025-09-10T00:53:14.201622005Z" level=info msg="StartContainer for \"717ce74c14e06c520b9a7608d42852c0887853d5c1b622203d83653b49681b4b\"" Sep 10 00:53:14.219030 systemd[1]: Started cri-containerd-717ce74c14e06c520b9a7608d42852c0887853d5c1b622203d83653b49681b4b.scope. Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.227000 audit: BPF prog-id=130 op=LOAD Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2941 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:14.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376365373463313465303663353230623961373630386434323835 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2941 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:14.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376365373463313465303663353230623961373630386434323835 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit: BPF prog-id=131 op=LOAD Sep 10 00:53:14.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000259d10 items=0 ppid=2941 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:14.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376365373463313465303663353230623961373630386434323835 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit: BPF prog-id=132 op=LOAD Sep 10 00:53:14.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000259d58 items=0 ppid=2941 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:14.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376365373463313465303663353230623961373630386434323835 Sep 10 00:53:14.228000 audit: BPF prog-id=132 op=UNLOAD Sep 10 00:53:14.228000 audit: BPF prog-id=131 op=UNLOAD Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 10 00:53:14.228000 audit: BPF prog-id=133 op=LOAD Sep 10 00:53:14.228000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0168 items=0 ppid=2941 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 10 00:53:14.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376365373463313465303663353230623961373630386434323835 Sep 10 00:53:14.271491 kubelet[1452]: E0910 00:53:14.271455 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:14.413045 env[1212]: time="2025-09-10T00:53:14.412995953Z" level=info msg="StartContainer for \"717ce74c14e06c520b9a7608d42852c0887853d5c1b622203d83653b49681b4b\" returns successfully" Sep 10 00:53:14.754062 systemd[1]: run-containerd-runc-k8s.io-717ce74c14e06c520b9a7608d42852c0887853d5c1b622203d83653b49681b4b-runc.o9OVuV.mount: Deactivated successfully. Sep 10 00:53:15.272612 kubelet[1452]: E0910 00:53:15.272561 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:15.379747 systemd-networkd[1034]: cali5ec59c6bf6e: Gained IPv6LL Sep 10 00:53:16.236049 kubelet[1452]: E0910 00:53:16.235990 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:16.257857 env[1212]: time="2025-09-10T00:53:16.257824291Z" level=info msg="StopPodSandbox for \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\"" Sep 10 00:53:16.272958 kubelet[1452]: E0910 00:53:16.272928 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.286 [WARNING][3038] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--pwp6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd1658b-d87b-47b3-883b-abab19e727b5", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d", Pod:"csi-node-driver-pwp6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6b6b5e9fe3c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.286 [INFO][3038] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.286 [INFO][3038] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" iface="eth0" netns="" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.286 [INFO][3038] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.286 [INFO][3038] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.302 [INFO][3047] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.302 [INFO][3047] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.302 [INFO][3047] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.307 [WARNING][3047] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.307 [INFO][3047] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.309 [INFO][3047] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:53:16.311680 env[1212]: 2025-09-10 00:53:16.310 [INFO][3038] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.312136 env[1212]: time="2025-09-10T00:53:16.311707187Z" level=info msg="TearDown network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\" successfully" Sep 10 00:53:16.312136 env[1212]: time="2025-09-10T00:53:16.311739207Z" level=info msg="StopPodSandbox for \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\" returns successfully" Sep 10 00:53:16.312243 env[1212]: time="2025-09-10T00:53:16.312219911Z" level=info msg="RemovePodSandbox for \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\"" Sep 10 00:53:16.312287 env[1212]: time="2025-09-10T00:53:16.312245520Z" level=info msg="Forcibly stopping sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\"" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.340 [WARNING][3065] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--pwp6j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bd1658b-d87b-47b3-883b-abab19e727b5", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"af8b584fdb2dfba5332c0fc188589b6affed238a168a47839d60b027b785da2d", Pod:"csi-node-driver-pwp6j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6b6b5e9fe3c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.340 [INFO][3065] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.340 [INFO][3065] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" iface="eth0" netns="" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.340 [INFO][3065] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.340 [INFO][3065] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.358 [INFO][3074] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.358 [INFO][3074] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.358 [INFO][3074] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.363 [WARNING][3074] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.363 [INFO][3074] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" HandleID="k8s-pod-network.05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Workload="10.0.0.143-k8s-csi--node--driver--pwp6j-eth0" Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.364 [INFO][3074] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:53:16.366845 env[1212]: 2025-09-10 00:53:16.365 [INFO][3065] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0" Sep 10 00:53:16.367244 env[1212]: time="2025-09-10T00:53:16.366876113Z" level=info msg="TearDown network for sandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\" successfully" Sep 10 00:53:16.372339 env[1212]: time="2025-09-10T00:53:16.372317012Z" level=info msg="RemovePodSandbox \"05343c55abb86cc1ccabe4fe7fd56237d2e34a22fbfa9a86b6a55f47a2a2dbb0\" returns successfully" Sep 10 00:53:16.372816 env[1212]: time="2025-09-10T00:53:16.372794080Z" level=info msg="StopPodSandbox for \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\"" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.401 [WARNING][3091] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5fc69035-f0dd-40e1-97ce-6557c879b47d", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355", Pod:"nginx-deployment-8587fbcb89-nnt95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ca3ae5c408", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.401 [INFO][3091] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.401 [INFO][3091] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" iface="eth0" netns="" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.401 [INFO][3091] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.401 [INFO][3091] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.418 [INFO][3100] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.418 [INFO][3100] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.419 [INFO][3100] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.423 [WARNING][3100] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.423 [INFO][3100] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.424 [INFO][3100] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:53:16.427598 env[1212]: 2025-09-10 00:53:16.426 [INFO][3091] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.427598 env[1212]: time="2025-09-10T00:53:16.427616013Z" level=info msg="TearDown network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\" successfully" Sep 10 00:53:16.427598 env[1212]: time="2025-09-10T00:53:16.427646540Z" level=info msg="StopPodSandbox for \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\" returns successfully" Sep 10 00:53:16.428164 env[1212]: time="2025-09-10T00:53:16.428017519Z" level=info msg="RemovePodSandbox for \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\"" Sep 10 00:53:16.428164 env[1212]: time="2025-09-10T00:53:16.428040682Z" level=info msg="Forcibly stopping sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\"" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.454 [WARNING][3118] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"5fc69035-f0dd-40e1-97ce-6557c879b47d", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2025, time.September, 10, 0, 52, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"9b1ae09c2a09a83c5051f1435fb9bd92ba3f58353729e37927ab71ff34fb5355", Pod:"nginx-deployment-8587fbcb89-nnt95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2ca3ae5c408", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.455 [INFO][3118] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.455 [INFO][3118] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" iface="eth0" netns="" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.455 [INFO][3118] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.455 [INFO][3118] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.471 [INFO][3127] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.471 [INFO][3127] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.471 [INFO][3127] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.477 [WARNING][3127] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.477 [INFO][3127] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" HandleID="k8s-pod-network.f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--nnt95-eth0" Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.478 [INFO][3127] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 10 00:53:16.481082 env[1212]: 2025-09-10 00:53:16.479 [INFO][3118] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9" Sep 10 00:53:16.481670 env[1212]: time="2025-09-10T00:53:16.481108855Z" level=info msg="TearDown network for sandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\" successfully" Sep 10 00:53:16.492848 env[1212]: time="2025-09-10T00:53:16.492769728Z" level=info msg="RemovePodSandbox \"f7b56f29fb8246eb5cfb7907c44f032b0b59bc7ce6edeb899e8ccbfd704ad0b9\" returns successfully" Sep 10 00:53:17.273854 kubelet[1452]: E0910 00:53:17.273789 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:18.274361 kubelet[1452]: E0910 00:53:18.274291 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:19.274873 kubelet[1452]: E0910 00:53:19.274821 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 10 00:53:20.275710 kubelet[1452]: E0910 00:53:20.275660 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"