Sep 13 01:09:50.646186 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 01:09:50.646201 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 01:09:50.646208 kernel: Disabled fast string operations Sep 13 01:09:50.646212 kernel: BIOS-provided physical RAM map: Sep 13 01:09:50.646216 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Sep 13 01:09:50.646220 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Sep 13 01:09:50.646225 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Sep 13 01:09:50.646230 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Sep 13 01:09:50.646234 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Sep 13 01:09:50.646238 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Sep 13 01:09:50.646242 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Sep 13 01:09:50.646246 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Sep 13 01:09:50.646250 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Sep 13 01:09:50.646254 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Sep 13 01:09:50.646260 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Sep 13 01:09:50.646265 kernel: NX (Execute Disable) protection: active Sep 13 01:09:50.646269 kernel: SMBIOS 2.7 present. Sep 13 01:09:50.646274 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Sep 13 01:09:50.646278 kernel: vmware: hypercall mode: 0x00 Sep 13 01:09:50.646283 kernel: Hypervisor detected: VMware Sep 13 01:09:50.646288 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Sep 13 01:09:50.646293 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Sep 13 01:09:50.646297 kernel: vmware: using clock offset of 3543181970 ns Sep 13 01:09:50.646301 kernel: tsc: Detected 3408.000 MHz processor Sep 13 01:09:50.646306 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 01:09:50.646311 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 01:09:50.646316 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Sep 13 01:09:50.646321 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 01:09:50.646325 kernel: total RAM covered: 3072M Sep 13 01:09:50.646331 kernel: Found optimal setting for mtrr clean up Sep 13 01:09:50.646336 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Sep 13 01:09:50.646340 kernel: Using GB pages for direct mapping Sep 13 01:09:50.646345 kernel: ACPI: Early table checksum verification disabled Sep 13 01:09:50.646349 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Sep 13 01:09:50.646354 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Sep 13 01:09:50.646358 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Sep 13 01:09:50.646363 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Sep 13 01:09:50.646367 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Sep 13 01:09:50.646372 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Sep 13 01:09:50.646377 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Sep 13 01:09:50.646384 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Sep 13 01:09:50.646389 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Sep 13 01:09:50.646394 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Sep 13 01:09:50.646399 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Sep 13 01:09:50.646404 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Sep 13 01:09:50.646409 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Sep 13 01:09:50.646414 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Sep 13 01:09:50.646419 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Sep 13 01:09:50.646424 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Sep 13 01:09:50.646429 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Sep 13 01:09:50.646434 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Sep 13 01:09:50.646438 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Sep 13 01:09:50.646443 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Sep 13 01:09:50.646449 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Sep 13 01:09:50.646454 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Sep 13 01:09:50.646459 kernel: system APIC only can use physical flat Sep 13 01:09:50.646463 kernel: Setting APIC routing to physical flat. Sep 13 01:09:50.646468 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 01:09:50.646473 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Sep 13 01:09:50.646478 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Sep 13 01:09:50.646483 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Sep 13 01:09:50.646487 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Sep 13 01:09:50.646492 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Sep 13 01:09:50.646498 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Sep 13 01:09:50.646503 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Sep 13 01:09:50.646507 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Sep 13 01:09:50.646512 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Sep 13 01:09:50.646517 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Sep 13 01:09:50.646522 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Sep 13 01:09:50.646527 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Sep 13 01:09:50.646531 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Sep 13 01:09:50.646536 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Sep 13 01:09:50.646542 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Sep 13 01:09:50.646547 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Sep 13 01:09:50.646551 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Sep 13 01:09:50.646556 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Sep 13 01:09:50.646561 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Sep 13 01:09:50.646566 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Sep 13 01:09:50.646570 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Sep 13 01:09:50.646575 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Sep 13 01:09:50.646580 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Sep 13 01:09:50.646585 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Sep 13 01:09:50.646590 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Sep 13 01:09:50.646595 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Sep 13 01:09:50.646600 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Sep 13 01:09:50.646605 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Sep 13 01:09:50.646609 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Sep 13 01:09:50.646629 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Sep 13 01:09:50.646634 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Sep 13 01:09:50.646638 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Sep 13 01:09:50.646643 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Sep 13 01:09:50.646648 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Sep 13 01:09:50.646653 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Sep 13 01:09:50.646658 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Sep 13 01:09:50.646663 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Sep 13 01:09:50.646668 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Sep 13 01:09:50.646672 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Sep 13 01:09:50.646677 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Sep 13 01:09:50.646682 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Sep 13 01:09:50.646686 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Sep 13 01:09:50.646691 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Sep 13 01:09:50.646696 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Sep 13 01:09:50.646701 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Sep 13 01:09:50.646706 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Sep 13 01:09:50.646711 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Sep 13 01:09:50.646715 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Sep 13 01:09:50.646720 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Sep 13 01:09:50.646725 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Sep 13 01:09:50.646729 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Sep 13 01:09:50.646734 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Sep 13 01:09:50.646739 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Sep 13 01:09:50.646743 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Sep 13 01:09:50.646749 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Sep 13 01:09:50.646754 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Sep 13 01:09:50.646758 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Sep 13 01:09:50.646771 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Sep 13 01:09:50.646777 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Sep 13 01:09:50.646782 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Sep 13 01:09:50.646791 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Sep 13 01:09:50.646796 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Sep 13 01:09:50.646801 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Sep 13 01:09:50.646806 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Sep 13 01:09:50.646812 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Sep 13 01:09:50.646817 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Sep 13 01:09:50.646822 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Sep 13 01:09:50.646827 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Sep 13 01:09:50.646832 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Sep 13 01:09:50.646837 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Sep 13 01:09:50.646842 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Sep 13 01:09:50.646847 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Sep 13 01:09:50.646853 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Sep 13 01:09:50.646858 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Sep 13 01:09:50.646863 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Sep 13 01:09:50.646868 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Sep 13 01:09:50.646873 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Sep 13 01:09:50.646878 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Sep 13 01:09:50.646883 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Sep 13 01:09:50.646888 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Sep 13 01:09:50.646893 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Sep 13 01:09:50.646898 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Sep 13 01:09:50.646904 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Sep 13 01:09:50.646909 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Sep 13 01:09:50.646914 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Sep 13 01:09:50.646919 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Sep 13 01:09:50.646924 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Sep 13 01:09:50.646929 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Sep 13 01:09:50.646934 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Sep 13 01:09:50.646939 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Sep 13 01:09:50.646944 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Sep 13 01:09:50.646949 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Sep 13 01:09:50.646955 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Sep 13 01:09:50.646960 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Sep 13 01:09:50.646965 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Sep 13 01:09:50.646970 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Sep 13 01:09:50.646975 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Sep 13 01:09:50.646980 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Sep 13 01:09:50.646985 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Sep 13 01:09:50.646990 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Sep 13 01:09:50.646994 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Sep 13 01:09:50.646999 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Sep 13 01:09:50.647005 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Sep 13 01:09:50.647010 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Sep 13 01:09:50.647015 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Sep 13 01:09:50.647020 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Sep 13 01:09:50.647025 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Sep 13 01:09:50.647030 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Sep 13 01:09:50.647035 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Sep 13 01:09:50.647040 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Sep 13 01:09:50.647045 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Sep 13 01:09:50.647051 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Sep 13 01:09:50.647056 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Sep 13 01:09:50.647061 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Sep 13 01:09:50.647066 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Sep 13 01:09:50.647071 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Sep 13 01:09:50.647076 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Sep 13 01:09:50.647081 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Sep 13 01:09:50.647086 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Sep 13 01:09:50.647091 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Sep 13 01:09:50.647096 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Sep 13 01:09:50.647102 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Sep 13 01:09:50.647107 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Sep 13 01:09:50.647112 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Sep 13 01:09:50.647117 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Sep 13 01:09:50.647122 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Sep 13 01:09:50.647127 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Sep 13 01:09:50.647132 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 13 01:09:50.647138 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 13 01:09:50.647143 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Sep 13 01:09:50.647148 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Sep 13 01:09:50.647154 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Sep 13 01:09:50.647159 kernel: Zone ranges: Sep 13 01:09:50.647164 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 01:09:50.647170 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Sep 13 01:09:50.647175 kernel: Normal empty Sep 13 01:09:50.647180 kernel: Movable zone start for each node Sep 13 01:09:50.647185 kernel: Early memory node ranges Sep 13 01:09:50.647190 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Sep 13 01:09:50.647195 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Sep 13 01:09:50.647201 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Sep 13 01:09:50.647206 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Sep 13 01:09:50.647211 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 01:09:50.647216 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Sep 13 01:09:50.647221 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Sep 13 01:09:50.647226 kernel: ACPI: PM-Timer IO Port: 0x1008 Sep 13 01:09:50.647231 kernel: system APIC only can use physical flat Sep 13 01:09:50.647236 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Sep 13 01:09:50.647242 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Sep 13 01:09:50.647247 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Sep 13 01:09:50.647252 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Sep 13 01:09:50.647258 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Sep 13 01:09:50.647262 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Sep 13 01:09:50.647268 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Sep 13 01:09:50.647273 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Sep 13 01:09:50.647278 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Sep 13 01:09:50.647283 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Sep 13 01:09:50.647288 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Sep 13 01:09:50.647293 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Sep 13 01:09:50.647299 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Sep 13 01:09:50.647304 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Sep 13 01:09:50.647309 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Sep 13 01:09:50.647314 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Sep 13 01:09:50.647319 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Sep 13 01:09:50.647324 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Sep 13 01:09:50.647329 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Sep 13 01:09:50.647334 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Sep 13 01:09:50.647339 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Sep 13 01:09:50.647344 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Sep 13 01:09:50.647350 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Sep 13 01:09:50.647355 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Sep 13 01:09:50.647360 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Sep 13 01:09:50.647365 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Sep 13 01:09:50.647370 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Sep 13 01:09:50.647375 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Sep 13 01:09:50.647380 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Sep 13 01:09:50.647386 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Sep 13 01:09:50.647391 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Sep 13 01:09:50.647396 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Sep 13 01:09:50.647401 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Sep 13 01:09:50.647406 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Sep 13 01:09:50.647411 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Sep 13 01:09:50.647416 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Sep 13 01:09:50.647421 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Sep 13 01:09:50.647426 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Sep 13 01:09:50.647431 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Sep 13 01:09:50.647437 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Sep 13 01:09:50.647442 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Sep 13 01:09:50.647447 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Sep 13 01:09:50.647452 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Sep 13 01:09:50.647458 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Sep 13 01:09:50.647463 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Sep 13 01:09:50.647468 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Sep 13 01:09:50.647473 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Sep 13 01:09:50.647478 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Sep 13 01:09:50.647483 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Sep 13 01:09:50.647488 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Sep 13 01:09:50.647494 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Sep 13 01:09:50.647499 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Sep 13 01:09:50.647504 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Sep 13 01:09:50.647509 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Sep 13 01:09:50.647514 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Sep 13 01:09:50.647519 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Sep 13 01:09:50.647524 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Sep 13 01:09:50.647529 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Sep 13 01:09:50.647534 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Sep 13 01:09:50.647539 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Sep 13 01:09:50.647545 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Sep 13 01:09:50.647550 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Sep 13 01:09:50.647559 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Sep 13 01:09:50.647564 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Sep 13 01:09:50.647569 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Sep 13 01:09:50.647574 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Sep 13 01:09:50.647579 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Sep 13 01:09:50.647584 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Sep 13 01:09:50.647589 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Sep 13 01:09:50.647595 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Sep 13 01:09:50.647600 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Sep 13 01:09:50.647605 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Sep 13 01:09:50.647610 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Sep 13 01:09:50.647615 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Sep 13 01:09:50.647620 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Sep 13 01:09:50.647625 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Sep 13 01:09:50.647630 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Sep 13 01:09:50.647635 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Sep 13 01:09:50.647640 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Sep 13 01:09:50.647646 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Sep 13 01:09:50.647651 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Sep 13 01:09:50.647656 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Sep 13 01:09:50.647661 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Sep 13 01:09:50.647666 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Sep 13 01:09:50.647671 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Sep 13 01:09:50.647676 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Sep 13 01:09:50.647681 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Sep 13 01:09:50.647686 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Sep 13 01:09:50.647692 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Sep 13 01:09:50.647697 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Sep 13 01:09:50.647702 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Sep 13 01:09:50.647707 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Sep 13 01:09:50.647713 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Sep 13 01:09:50.647718 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Sep 13 01:09:50.647723 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Sep 13 01:09:50.647728 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Sep 13 01:09:50.647733 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Sep 13 01:09:50.647738 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Sep 13 01:09:50.647744 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Sep 13 01:09:50.647749 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Sep 13 01:09:50.647754 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Sep 13 01:09:50.647759 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Sep 13 01:09:50.647769 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Sep 13 01:09:50.647774 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Sep 13 01:09:50.647780 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Sep 13 01:09:50.647785 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Sep 13 01:09:50.647790 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Sep 13 01:09:50.647796 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Sep 13 01:09:50.647801 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Sep 13 01:09:50.647806 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Sep 13 01:09:50.647811 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Sep 13 01:09:50.647816 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Sep 13 01:09:50.647821 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Sep 13 01:09:50.647826 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Sep 13 01:09:50.647831 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Sep 13 01:09:50.647836 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Sep 13 01:09:50.647841 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Sep 13 01:09:50.647847 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Sep 13 01:09:50.647852 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Sep 13 01:09:50.647857 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Sep 13 01:09:50.647862 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Sep 13 01:09:50.647867 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Sep 13 01:09:50.647872 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Sep 13 01:09:50.647877 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Sep 13 01:09:50.647882 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Sep 13 01:09:50.647887 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Sep 13 01:09:50.647893 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Sep 13 01:09:50.647898 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Sep 13 01:09:50.647903 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Sep 13 01:09:50.647908 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Sep 13 01:09:50.647914 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 01:09:50.647919 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Sep 13 01:09:50.647924 kernel: TSC deadline timer available Sep 13 01:09:50.647929 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Sep 13 01:09:50.647934 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Sep 13 01:09:50.647940 kernel: Booting paravirtualized kernel on VMware hypervisor Sep 13 01:09:50.647945 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 01:09:50.647951 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Sep 13 01:09:50.647956 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Sep 13 01:09:50.647961 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Sep 13 01:09:50.647966 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Sep 13 01:09:50.647971 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Sep 13 01:09:50.647976 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Sep 13 01:09:50.647981 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Sep 13 01:09:50.647987 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Sep 13 01:09:50.647992 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Sep 13 01:09:50.647997 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Sep 13 01:09:50.648008 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Sep 13 01:09:50.648014 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Sep 13 01:09:50.648020 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Sep 13 01:09:50.648025 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Sep 13 01:09:50.648030 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Sep 13 01:09:50.648036 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Sep 13 01:09:50.648042 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Sep 13 01:09:50.648047 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Sep 13 01:09:50.648052 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Sep 13 01:09:50.648058 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Sep 13 01:09:50.648063 kernel: Policy zone: DMA32 Sep 13 01:09:50.648069 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 01:09:50.648075 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 01:09:50.648081 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Sep 13 01:09:50.648087 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Sep 13 01:09:50.648093 kernel: printk: log_buf_len min size: 262144 bytes Sep 13 01:09:50.648098 kernel: printk: log_buf_len: 1048576 bytes Sep 13 01:09:50.648104 kernel: printk: early log buf free: 239728(91%) Sep 13 01:09:50.648109 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 01:09:50.648115 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 01:09:50.648120 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 01:09:50.648126 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 155976K reserved, 0K cma-reserved) Sep 13 01:09:50.648131 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Sep 13 01:09:50.648138 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 01:09:50.648144 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 01:09:50.648150 kernel: rcu: Hierarchical RCU implementation. Sep 13 01:09:50.648155 kernel: rcu: RCU event tracing is enabled. Sep 13 01:09:50.648161 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Sep 13 01:09:50.648167 kernel: Rude variant of Tasks RCU enabled. Sep 13 01:09:50.648173 kernel: Tracing variant of Tasks RCU enabled. Sep 13 01:09:50.648179 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 01:09:50.648184 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Sep 13 01:09:50.648190 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Sep 13 01:09:50.648195 kernel: random: crng init done Sep 13 01:09:50.648200 kernel: Console: colour VGA+ 80x25 Sep 13 01:09:50.648206 kernel: printk: console [tty0] enabled Sep 13 01:09:50.648211 kernel: printk: console [ttyS0] enabled Sep 13 01:09:50.648217 kernel: ACPI: Core revision 20210730 Sep 13 01:09:50.648223 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Sep 13 01:09:50.648229 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 01:09:50.648234 kernel: x2apic enabled Sep 13 01:09:50.648240 kernel: Switched APIC routing to physical x2apic. Sep 13 01:09:50.648245 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Sep 13 01:09:50.648251 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Sep 13 01:09:50.648257 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Sep 13 01:09:50.648262 kernel: Disabled fast string operations Sep 13 01:09:50.648267 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 13 01:09:50.648274 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Sep 13 01:09:50.648280 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 01:09:50.648285 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Sep 13 01:09:50.648291 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 13 01:09:50.648297 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 13 01:09:50.648302 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Sep 13 01:09:50.648307 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Sep 13 01:09:50.648313 kernel: RETBleed: Mitigation: Enhanced IBRS Sep 13 01:09:50.648318 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 13 01:09:50.648325 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 13 01:09:50.648330 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 01:09:50.648336 kernel: SRBDS: Unknown: Dependent on hypervisor status Sep 13 01:09:50.648341 kernel: GDS: Unknown: Dependent on hypervisor status Sep 13 01:09:50.648347 kernel: active return thunk: its_return_thunk Sep 13 01:09:50.648352 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 01:09:50.648357 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 01:09:50.648364 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 01:09:50.648369 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 01:09:50.648376 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 01:09:50.648381 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Sep 13 01:09:50.648387 kernel: Freeing SMP alternatives memory: 32K Sep 13 01:09:50.648392 kernel: pid_max: default: 131072 minimum: 1024 Sep 13 01:09:50.648398 kernel: LSM: Security Framework initializing Sep 13 01:09:50.648403 kernel: SELinux: Initializing. Sep 13 01:09:50.648409 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 01:09:50.648414 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 01:09:50.648420 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Sep 13 01:09:50.648426 kernel: Performance Events: Skylake events, core PMU driver. Sep 13 01:09:50.648432 kernel: core: CPUID marked event: 'cpu cycles' unavailable Sep 13 01:09:50.648437 kernel: core: CPUID marked event: 'instructions' unavailable Sep 13 01:09:50.648443 kernel: core: CPUID marked event: 'bus cycles' unavailable Sep 13 01:09:50.648448 kernel: core: CPUID marked event: 'cache references' unavailable Sep 13 01:09:50.648453 kernel: core: CPUID marked event: 'cache misses' unavailable Sep 13 01:09:50.648458 kernel: core: CPUID marked event: 'branch instructions' unavailable Sep 13 01:09:50.648464 kernel: core: CPUID marked event: 'branch misses' unavailable Sep 13 01:09:50.648470 kernel: ... version: 1 Sep 13 01:09:50.648476 kernel: ... bit width: 48 Sep 13 01:09:50.648481 kernel: ... generic registers: 4 Sep 13 01:09:50.648486 kernel: ... value mask: 0000ffffffffffff Sep 13 01:09:50.648492 kernel: ... max period: 000000007fffffff Sep 13 01:09:50.648497 kernel: ... fixed-purpose events: 0 Sep 13 01:09:50.648503 kernel: ... event mask: 000000000000000f Sep 13 01:09:50.648508 kernel: signal: max sigframe size: 1776 Sep 13 01:09:50.648514 kernel: rcu: Hierarchical SRCU implementation. Sep 13 01:09:50.648520 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 01:09:50.648526 kernel: smp: Bringing up secondary CPUs ... Sep 13 01:09:50.648531 kernel: x86: Booting SMP configuration: Sep 13 01:09:50.648536 kernel: .... node #0, CPUs: #1 Sep 13 01:09:50.648542 kernel: Disabled fast string operations Sep 13 01:09:50.648547 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Sep 13 01:09:50.648553 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Sep 13 01:09:50.648561 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 01:09:50.648567 kernel: smpboot: Max logical packages: 128 Sep 13 01:09:50.648572 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Sep 13 01:09:50.648579 kernel: devtmpfs: initialized Sep 13 01:09:50.648584 kernel: x86/mm: Memory block size: 128MB Sep 13 01:09:50.648590 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Sep 13 01:09:50.648595 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 01:09:50.648601 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Sep 13 01:09:50.648606 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 01:09:50.648612 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 01:09:50.648618 kernel: audit: initializing netlink subsys (disabled) Sep 13 01:09:50.648623 kernel: audit: type=2000 audit(1757725789.085:1): state=initialized audit_enabled=0 res=1 Sep 13 01:09:50.648629 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 01:09:50.648635 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 01:09:50.648640 kernel: cpuidle: using governor menu Sep 13 01:09:50.648646 kernel: Simple Boot Flag at 0x36 set to 0x80 Sep 13 01:09:50.648651 kernel: ACPI: bus type PCI registered Sep 13 01:09:50.648657 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 01:09:50.648662 kernel: dca service started, version 1.12.1 Sep 13 01:09:50.648668 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Sep 13 01:09:50.648673 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Sep 13 01:09:50.648679 kernel: PCI: Using configuration type 1 for base access Sep 13 01:09:50.648685 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 01:09:50.648691 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 01:09:50.648696 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 01:09:50.648702 kernel: ACPI: Added _OSI(Module Device) Sep 13 01:09:50.648707 kernel: ACPI: Added _OSI(Processor Device) Sep 13 01:09:50.648712 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 01:09:50.648718 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 01:09:50.648723 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 01:09:50.648730 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 01:09:50.648735 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 01:09:50.648742 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Sep 13 01:09:50.648747 kernel: ACPI: Interpreter enabled Sep 13 01:09:50.648753 kernel: ACPI: PM: (supports S0 S1 S5) Sep 13 01:09:50.648758 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 01:09:50.648772 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 01:09:50.648779 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Sep 13 01:09:50.648784 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Sep 13 01:09:50.648860 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 13 01:09:50.648912 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Sep 13 01:09:50.648959 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Sep 13 01:09:50.648967 kernel: PCI host bridge to bus 0000:00 Sep 13 01:09:50.649016 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 13 01:09:50.649060 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Sep 13 01:09:50.649104 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 13 01:09:50.649146 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 13 01:09:50.649188 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Sep 13 01:09:50.649229 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Sep 13 01:09:50.649285 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Sep 13 01:09:50.649339 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Sep 13 01:09:50.649393 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Sep 13 01:09:50.649448 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Sep 13 01:09:50.649496 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Sep 13 01:09:50.649543 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Sep 13 01:09:50.649591 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Sep 13 01:09:50.649637 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Sep 13 01:09:50.649684 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Sep 13 01:09:50.649738 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Sep 13 01:09:50.649800 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Sep 13 01:09:50.649850 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Sep 13 01:09:50.649903 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Sep 13 01:09:50.649951 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Sep 13 01:09:50.650000 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Sep 13 01:09:50.650051 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Sep 13 01:09:50.650102 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Sep 13 01:09:50.650148 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Sep 13 01:09:50.650195 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Sep 13 01:09:50.650241 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Sep 13 01:09:50.650289 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 13 01:09:50.650340 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Sep 13 01:09:50.650395 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.650444 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.650495 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.650544 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.650640 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.650688 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.650742 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.650806 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.650859 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.650907 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.650959 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651008 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651058 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651108 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651161 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651209 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651259 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651307 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651361 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651409 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651461 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651509 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651563 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651611 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651664 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651712 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651770 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651820 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651871 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.651919 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.651970 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.652021 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.652072 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.652120 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.652172 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.652219 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654141 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.654206 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654264 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.654317 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654376 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.654428 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654483 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.654536 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654633 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.654686 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654741 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.654801 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654857 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.654924 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.654980 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.655032 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.655085 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.655136 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.655190 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.655243 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.655301 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.655352 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.655406 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.655458 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.655565 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.655621 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.655680 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Sep 13 01:09:50.655731 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.665825 kernel: pci_bus 0000:01: extended config space not accessible Sep 13 01:09:50.665891 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 13 01:09:50.665970 kernel: pci_bus 0000:02: extended config space not accessible Sep 13 01:09:50.665982 kernel: acpiphp: Slot [32] registered Sep 13 01:09:50.665991 kernel: acpiphp: Slot [33] registered Sep 13 01:09:50.665997 kernel: acpiphp: Slot [34] registered Sep 13 01:09:50.666002 kernel: acpiphp: Slot [35] registered Sep 13 01:09:50.666008 kernel: acpiphp: Slot [36] registered Sep 13 01:09:50.666014 kernel: acpiphp: Slot [37] registered Sep 13 01:09:50.666019 kernel: acpiphp: Slot [38] registered Sep 13 01:09:50.666025 kernel: acpiphp: Slot [39] registered Sep 13 01:09:50.666030 kernel: acpiphp: Slot [40] registered Sep 13 01:09:50.666036 kernel: acpiphp: Slot [41] registered Sep 13 01:09:50.666041 kernel: acpiphp: Slot [42] registered Sep 13 01:09:50.666048 kernel: acpiphp: Slot [43] registered Sep 13 01:09:50.666054 kernel: acpiphp: Slot [44] registered Sep 13 01:09:50.666059 kernel: acpiphp: Slot [45] registered Sep 13 01:09:50.666065 kernel: acpiphp: Slot [46] registered Sep 13 01:09:50.666073 kernel: acpiphp: Slot [47] registered Sep 13 01:09:50.666079 kernel: acpiphp: Slot [48] registered Sep 13 01:09:50.666084 kernel: acpiphp: Slot [49] registered Sep 13 01:09:50.666093 kernel: acpiphp: Slot [50] registered Sep 13 01:09:50.666101 kernel: acpiphp: Slot [51] registered Sep 13 01:09:50.666108 kernel: acpiphp: Slot [52] registered Sep 13 01:09:50.666114 kernel: acpiphp: Slot [53] registered Sep 13 01:09:50.666119 kernel: acpiphp: Slot [54] registered Sep 13 01:09:50.666125 kernel: acpiphp: Slot [55] registered Sep 13 01:09:50.666136 kernel: acpiphp: Slot [56] registered Sep 13 01:09:50.666143 kernel: acpiphp: Slot [57] registered Sep 13 01:09:50.666148 kernel: acpiphp: Slot [58] registered Sep 13 01:09:50.666154 kernel: acpiphp: Slot [59] registered Sep 13 01:09:50.666159 kernel: acpiphp: Slot [60] registered Sep 13 01:09:50.666165 kernel: acpiphp: Slot [61] registered Sep 13 01:09:50.666178 kernel: acpiphp: Slot [62] registered Sep 13 01:09:50.666185 kernel: acpiphp: Slot [63] registered Sep 13 01:09:50.666241 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Sep 13 01:09:50.666292 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Sep 13 01:09:50.666339 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Sep 13 01:09:50.666387 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Sep 13 01:09:50.666433 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Sep 13 01:09:50.666481 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Sep 13 01:09:50.666530 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Sep 13 01:09:50.666597 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Sep 13 01:09:50.666644 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Sep 13 01:09:50.666700 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Sep 13 01:09:50.666751 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Sep 13 01:09:50.666814 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Sep 13 01:09:50.666864 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Sep 13 01:09:50.666916 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Sep 13 01:09:50.666966 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Sep 13 01:09:50.667016 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Sep 13 01:09:50.667065 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Sep 13 01:09:50.667113 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Sep 13 01:09:50.667162 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Sep 13 01:09:50.667211 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Sep 13 01:09:50.667261 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Sep 13 01:09:50.667310 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Sep 13 01:09:50.667360 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Sep 13 01:09:50.667406 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Sep 13 01:09:50.667454 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Sep 13 01:09:50.667501 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Sep 13 01:09:50.667552 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Sep 13 01:09:50.667600 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Sep 13 01:09:50.667650 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Sep 13 01:09:50.667700 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Sep 13 01:09:50.667747 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Sep 13 01:09:50.667810 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Sep 13 01:09:50.667865 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Sep 13 01:09:50.667914 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Sep 13 01:09:50.667962 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Sep 13 01:09:50.668012 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Sep 13 01:09:50.668060 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Sep 13 01:09:50.668108 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Sep 13 01:09:50.668157 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Sep 13 01:09:50.668205 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Sep 13 01:09:50.668256 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Sep 13 01:09:50.668311 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Sep 13 01:09:50.668362 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Sep 13 01:09:50.668412 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Sep 13 01:09:50.668462 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Sep 13 01:09:50.668512 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Sep 13 01:09:50.668568 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Sep 13 01:09:50.668621 kernel: pci 0000:0b:00.0: supports D1 D2 Sep 13 01:09:50.668674 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 01:09:50.668723 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Sep 13 01:09:50.668781 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Sep 13 01:09:50.668829 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Sep 13 01:09:50.668877 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Sep 13 01:09:50.668934 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Sep 13 01:09:50.668984 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Sep 13 01:09:50.669032 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Sep 13 01:09:50.669083 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Sep 13 01:09:50.669133 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Sep 13 01:09:50.669182 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Sep 13 01:09:50.669229 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Sep 13 01:09:50.669278 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Sep 13 01:09:50.669328 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Sep 13 01:09:50.669377 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Sep 13 01:09:50.669427 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Sep 13 01:09:50.669477 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Sep 13 01:09:50.669526 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Sep 13 01:09:50.669574 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Sep 13 01:09:50.669623 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Sep 13 01:09:50.669672 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Sep 13 01:09:50.669720 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Sep 13 01:09:50.669781 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Sep 13 01:09:50.669836 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Sep 13 01:09:50.669884 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Sep 13 01:09:50.669934 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Sep 13 01:09:50.669982 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Sep 13 01:09:50.670030 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Sep 13 01:09:50.670080 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Sep 13 01:09:50.670128 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Sep 13 01:09:50.670176 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Sep 13 01:09:50.670226 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Sep 13 01:09:50.670276 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Sep 13 01:09:50.670324 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Sep 13 01:09:50.670372 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Sep 13 01:09:50.670420 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Sep 13 01:09:50.670470 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Sep 13 01:09:50.670519 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Sep 13 01:09:50.670567 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Sep 13 01:09:50.670632 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Sep 13 01:09:50.670682 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Sep 13 01:09:50.670730 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Sep 13 01:09:50.673523 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Sep 13 01:09:50.673582 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Sep 13 01:09:50.673634 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Sep 13 01:09:50.673682 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Sep 13 01:09:50.673734 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Sep 13 01:09:50.674126 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Sep 13 01:09:50.674180 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Sep 13 01:09:50.674230 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Sep 13 01:09:50.674278 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Sep 13 01:09:50.674342 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Sep 13 01:09:50.674391 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Sep 13 01:09:50.674438 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Sep 13 01:09:50.674487 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Sep 13 01:09:50.674537 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Sep 13 01:09:50.674639 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Sep 13 01:09:50.674686 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Sep 13 01:09:50.675811 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Sep 13 01:09:50.675871 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Sep 13 01:09:50.675922 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Sep 13 01:09:50.675971 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Sep 13 01:09:50.676021 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Sep 13 01:09:50.676071 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Sep 13 01:09:50.676118 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Sep 13 01:09:50.676166 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Sep 13 01:09:50.676214 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Sep 13 01:09:50.676263 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Sep 13 01:09:50.676310 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Sep 13 01:09:50.676359 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Sep 13 01:09:50.676408 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Sep 13 01:09:50.676455 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Sep 13 01:09:50.676504 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Sep 13 01:09:50.676550 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Sep 13 01:09:50.676620 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Sep 13 01:09:50.676685 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Sep 13 01:09:50.676732 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Sep 13 01:09:50.677623 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Sep 13 01:09:50.677686 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Sep 13 01:09:50.677738 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Sep 13 01:09:50.678012 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Sep 13 01:09:50.678024 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Sep 13 01:09:50.678031 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Sep 13 01:09:50.678037 kernel: ACPI: PCI: Interrupt link LNKB disabled Sep 13 01:09:50.678043 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 13 01:09:50.678049 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Sep 13 01:09:50.678057 kernel: iommu: Default domain type: Translated Sep 13 01:09:50.678063 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 01:09:50.678116 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Sep 13 01:09:50.678166 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 13 01:09:50.678215 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Sep 13 01:09:50.678223 kernel: vgaarb: loaded Sep 13 01:09:50.678229 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 01:09:50.678235 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 01:09:50.678241 kernel: PTP clock support registered Sep 13 01:09:50.678249 kernel: PCI: Using ACPI for IRQ routing Sep 13 01:09:50.678254 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 13 01:09:50.678260 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Sep 13 01:09:50.678266 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Sep 13 01:09:50.678272 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Sep 13 01:09:50.678278 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Sep 13 01:09:50.678283 kernel: clocksource: Switched to clocksource tsc-early Sep 13 01:09:50.678289 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 01:09:50.678295 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 01:09:50.678302 kernel: pnp: PnP ACPI init Sep 13 01:09:50.678355 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Sep 13 01:09:50.678400 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Sep 13 01:09:50.678444 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Sep 13 01:09:50.678492 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Sep 13 01:09:50.678543 kernel: pnp 00:06: [dma 2] Sep 13 01:09:50.678590 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Sep 13 01:09:50.678637 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Sep 13 01:09:50.678680 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Sep 13 01:09:50.678689 kernel: pnp: PnP ACPI: found 8 devices Sep 13 01:09:50.678695 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 01:09:50.678701 kernel: NET: Registered PF_INET protocol family Sep 13 01:09:50.678706 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 01:09:50.678712 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 13 01:09:50.678719 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 01:09:50.678726 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 01:09:50.678732 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 13 01:09:50.678737 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 13 01:09:50.678743 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 01:09:50.678749 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 01:09:50.678755 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 01:09:50.678770 kernel: NET: Registered PF_XDP protocol family Sep 13 01:09:50.678825 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Sep 13 01:09:50.678879 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Sep 13 01:09:50.678931 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Sep 13 01:09:50.678982 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Sep 13 01:09:50.679031 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Sep 13 01:09:50.679082 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Sep 13 01:09:50.679131 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Sep 13 01:09:50.679184 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Sep 13 01:09:50.679233 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Sep 13 01:09:50.679283 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Sep 13 01:09:50.679332 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Sep 13 01:09:50.679382 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Sep 13 01:09:50.679430 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Sep 13 01:09:50.679481 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Sep 13 01:09:50.679529 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Sep 13 01:09:50.679578 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Sep 13 01:09:50.679626 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Sep 13 01:09:50.679676 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Sep 13 01:09:50.679724 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Sep 13 01:09:50.684639 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Sep 13 01:09:50.684700 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Sep 13 01:09:50.684752 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Sep 13 01:09:50.684847 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Sep 13 01:09:50.684898 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Sep 13 01:09:50.684947 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Sep 13 01:09:50.685000 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685048 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.685096 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685143 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.685192 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685239 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.685287 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685335 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.685386 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685433 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.685482 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685529 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.685577 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685625 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.685672 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.685719 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.686672 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.686729 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.686816 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.686866 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.686916 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.686965 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687015 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687064 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687115 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687162 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687211 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687259 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687308 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687356 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687405 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687452 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687502 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687551 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687599 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687646 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687694 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687741 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687802 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687852 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687901 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.687949 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.687996 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688043 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688091 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688139 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688189 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688236 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688283 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688334 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688382 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688430 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688478 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688526 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688578 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688627 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688674 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688723 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688777 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688828 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688876 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.688923 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.688970 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689018 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689064 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689111 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689157 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689204 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689254 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689301 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689349 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689397 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689444 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689491 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689539 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689592 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689641 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.689690 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.689740 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.693361 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.693480 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.693555 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.693608 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Sep 13 01:09:50.693658 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Sep 13 01:09:50.693708 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 13 01:09:50.693758 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Sep 13 01:09:50.693842 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Sep 13 01:09:50.693892 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Sep 13 01:09:50.693940 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Sep 13 01:09:50.693991 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Sep 13 01:09:50.694040 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Sep 13 01:09:50.694096 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Sep 13 01:09:50.694146 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Sep 13 01:09:50.694194 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Sep 13 01:09:50.694243 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Sep 13 01:09:50.694293 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Sep 13 01:09:50.695964 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Sep 13 01:09:50.696028 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Sep 13 01:09:50.696082 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Sep 13 01:09:50.696132 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Sep 13 01:09:50.696181 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Sep 13 01:09:50.696229 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Sep 13 01:09:50.696278 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Sep 13 01:09:50.696326 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Sep 13 01:09:50.696379 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Sep 13 01:09:50.696426 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Sep 13 01:09:50.696474 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Sep 13 01:09:50.696521 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Sep 13 01:09:50.696576 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Sep 13 01:09:50.696640 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Sep 13 01:09:50.696688 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Sep 13 01:09:50.696735 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Sep 13 01:09:50.696790 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Sep 13 01:09:50.696837 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Sep 13 01:09:50.696885 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Sep 13 01:09:50.696933 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Sep 13 01:09:50.696980 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Sep 13 01:09:50.697032 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Sep 13 01:09:50.697080 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Sep 13 01:09:50.697127 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Sep 13 01:09:50.697176 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Sep 13 01:09:50.697224 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Sep 13 01:09:50.697273 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Sep 13 01:09:50.697614 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Sep 13 01:09:50.697670 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Sep 13 01:09:50.697720 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Sep 13 01:09:50.697787 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Sep 13 01:09:50.697841 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Sep 13 01:09:50.697890 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Sep 13 01:09:50.697941 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Sep 13 01:09:50.697990 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Sep 13 01:09:50.698037 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Sep 13 01:09:50.698084 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Sep 13 01:09:50.698132 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Sep 13 01:09:50.698181 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Sep 13 01:09:50.698228 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Sep 13 01:09:50.698275 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Sep 13 01:09:50.698322 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Sep 13 01:09:50.698372 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Sep 13 01:09:50.698420 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Sep 13 01:09:50.698467 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Sep 13 01:09:50.698514 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Sep 13 01:09:50.698562 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Sep 13 01:09:50.698609 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Sep 13 01:09:50.698657 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Sep 13 01:09:50.698705 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Sep 13 01:09:50.698753 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Sep 13 01:09:50.698825 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Sep 13 01:09:50.698875 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Sep 13 01:09:50.698924 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Sep 13 01:09:50.698971 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Sep 13 01:09:50.699018 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Sep 13 01:09:50.699065 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Sep 13 01:09:50.699114 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Sep 13 01:09:50.699162 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Sep 13 01:09:50.699209 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Sep 13 01:09:50.699256 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Sep 13 01:09:50.699307 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Sep 13 01:09:50.699355 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Sep 13 01:09:50.699402 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Sep 13 01:09:50.699450 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Sep 13 01:09:50.699497 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Sep 13 01:09:50.699545 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Sep 13 01:09:50.699594 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Sep 13 01:09:50.699641 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Sep 13 01:09:50.699690 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Sep 13 01:09:50.699739 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Sep 13 01:09:50.699796 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Sep 13 01:09:50.699844 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Sep 13 01:09:50.699891 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Sep 13 01:09:50.699940 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Sep 13 01:09:50.699987 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Sep 13 01:09:50.700035 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Sep 13 01:09:50.700082 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Sep 13 01:09:50.700131 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Sep 13 01:09:50.700178 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Sep 13 01:09:50.700261 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Sep 13 01:09:50.700326 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Sep 13 01:09:50.700374 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Sep 13 01:09:50.700421 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Sep 13 01:09:50.700468 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Sep 13 01:09:50.700516 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Sep 13 01:09:50.700590 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Sep 13 01:09:50.700656 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Sep 13 01:09:50.700704 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Sep 13 01:09:50.700751 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Sep 13 01:09:50.700809 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Sep 13 01:09:50.700856 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Sep 13 01:09:50.700903 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Sep 13 01:09:50.700951 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Sep 13 01:09:50.700997 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Sep 13 01:09:50.701056 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Sep 13 01:09:50.701109 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Sep 13 01:09:50.701156 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Sep 13 01:09:50.701203 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Sep 13 01:09:50.701668 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Sep 13 01:09:50.701731 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Sep 13 01:09:50.701804 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Sep 13 01:09:50.702129 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Sep 13 01:09:50.702178 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Sep 13 01:09:50.702221 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Sep 13 01:09:50.702265 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Sep 13 01:09:50.702307 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Sep 13 01:09:50.702471 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Sep 13 01:09:50.702523 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Sep 13 01:09:50.702570 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Sep 13 01:09:50.702614 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Sep 13 01:09:50.702678 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Sep 13 01:09:50.702966 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Sep 13 01:09:50.703013 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Sep 13 01:09:50.703333 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Sep 13 01:09:50.703392 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Sep 13 01:09:50.703438 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Sep 13 01:09:50.703482 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Sep 13 01:09:50.703529 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Sep 13 01:09:50.703578 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Sep 13 01:09:50.703623 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Sep 13 01:09:50.703669 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Sep 13 01:09:50.703716 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Sep 13 01:09:50.703759 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Sep 13 01:09:50.703823 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Sep 13 01:09:50.703869 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Sep 13 01:09:50.703919 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Sep 13 01:09:50.703964 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Sep 13 01:09:50.704016 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Sep 13 01:09:50.704061 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Sep 13 01:09:50.704109 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Sep 13 01:09:50.704154 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Sep 13 01:09:50.704202 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Sep 13 01:09:50.704247 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Sep 13 01:09:50.704297 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Sep 13 01:09:50.704342 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Sep 13 01:09:50.704386 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Sep 13 01:09:50.704432 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Sep 13 01:09:50.704477 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Sep 13 01:09:50.704531 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Sep 13 01:09:50.704622 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Sep 13 01:09:50.704669 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Sep 13 01:09:50.704712 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Sep 13 01:09:50.704830 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Sep 13 01:09:50.704878 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Sep 13 01:09:50.704925 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Sep 13 01:09:50.704969 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Sep 13 01:09:50.705019 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Sep 13 01:09:50.705063 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Sep 13 01:09:50.705110 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Sep 13 01:09:50.705155 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Sep 13 01:09:50.705202 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Sep 13 01:09:50.705247 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Sep 13 01:09:50.705296 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Sep 13 01:09:50.705340 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Sep 13 01:09:50.705383 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Sep 13 01:09:50.705434 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Sep 13 01:09:50.705478 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Sep 13 01:09:50.705521 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Sep 13 01:09:50.705569 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Sep 13 01:09:50.705615 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Sep 13 01:09:50.705658 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Sep 13 01:09:50.705707 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Sep 13 01:09:50.705750 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Sep 13 01:09:50.705811 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Sep 13 01:09:50.705857 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Sep 13 01:09:50.705908 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Sep 13 01:09:50.705953 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Sep 13 01:09:50.706002 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Sep 13 01:09:50.706046 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Sep 13 01:09:50.706096 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Sep 13 01:09:50.706141 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Sep 13 01:09:50.706191 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Sep 13 01:09:50.706236 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Sep 13 01:09:50.706280 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Sep 13 01:09:50.706328 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Sep 13 01:09:50.706373 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Sep 13 01:09:50.706417 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Sep 13 01:09:50.706465 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Sep 13 01:09:50.706512 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Sep 13 01:09:50.706578 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Sep 13 01:09:50.706638 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Sep 13 01:09:50.706687 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Sep 13 01:09:50.706733 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Sep 13 01:09:50.706801 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Sep 13 01:09:50.706851 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Sep 13 01:09:50.706899 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Sep 13 01:09:50.706944 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Sep 13 01:09:50.706992 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Sep 13 01:09:50.707036 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Sep 13 01:09:50.707089 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Sep 13 01:09:50.707100 kernel: PCI: CLS 32 bytes, default 64 Sep 13 01:09:50.707107 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 01:09:50.707113 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Sep 13 01:09:50.707119 kernel: clocksource: Switched to clocksource tsc Sep 13 01:09:50.707125 kernel: Initialise system trusted keyrings Sep 13 01:09:50.707131 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 13 01:09:50.707138 kernel: Key type asymmetric registered Sep 13 01:09:50.707143 kernel: Asymmetric key parser 'x509' registered Sep 13 01:09:50.707149 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 01:09:50.707156 kernel: io scheduler mq-deadline registered Sep 13 01:09:50.707162 kernel: io scheduler kyber registered Sep 13 01:09:50.707168 kernel: io scheduler bfq registered Sep 13 01:09:50.707220 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Sep 13 01:09:50.707290 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.707340 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Sep 13 01:09:50.707403 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.707451 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Sep 13 01:09:50.707501 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.707550 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Sep 13 01:09:50.707603 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.707651 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Sep 13 01:09:50.707700 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.707747 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Sep 13 01:09:50.707886 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.707937 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Sep 13 01:09:50.708274 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.708330 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Sep 13 01:09:50.708380 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.708752 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Sep 13 01:09:50.708821 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.708872 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Sep 13 01:09:50.709202 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.709258 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Sep 13 01:09:50.709308 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.709489 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Sep 13 01:09:50.709548 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.709597 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Sep 13 01:09:50.709646 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.709986 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Sep 13 01:09:50.710038 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710091 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Sep 13 01:09:50.710140 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710188 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Sep 13 01:09:50.710236 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710285 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Sep 13 01:09:50.710332 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710382 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Sep 13 01:09:50.710430 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710477 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Sep 13 01:09:50.710527 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710580 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Sep 13 01:09:50.710628 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710679 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Sep 13 01:09:50.710728 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710801 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Sep 13 01:09:50.710850 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710897 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Sep 13 01:09:50.710945 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.710995 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Sep 13 01:09:50.711043 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711091 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Sep 13 01:09:50.711139 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711186 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Sep 13 01:09:50.711234 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711284 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Sep 13 01:09:50.711333 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711381 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Sep 13 01:09:50.711429 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711476 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Sep 13 01:09:50.711527 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711575 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Sep 13 01:09:50.711624 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711674 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Sep 13 01:09:50.711722 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711780 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Sep 13 01:09:50.711834 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 01:09:50.711843 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 01:09:50.711850 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 01:09:50.711856 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 01:09:50.711862 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Sep 13 01:09:50.711868 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 13 01:09:50.711874 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 13 01:09:50.711925 kernel: rtc_cmos 00:01: registered as rtc0 Sep 13 01:09:50.711971 kernel: rtc_cmos 00:01: setting system clock to 2025-09-13T01:09:50 UTC (1757725790) Sep 13 01:09:50.712015 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Sep 13 01:09:50.712023 kernel: intel_pstate: CPU model not supported Sep 13 01:09:50.712029 kernel: NET: Registered PF_INET6 protocol family Sep 13 01:09:50.712035 kernel: Segment Routing with IPv6 Sep 13 01:09:50.712041 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 01:09:50.712047 kernel: NET: Registered PF_PACKET protocol family Sep 13 01:09:50.712055 kernel: Key type dns_resolver registered Sep 13 01:09:50.712061 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 13 01:09:50.712067 kernel: IPI shorthand broadcast: enabled Sep 13 01:09:50.712073 kernel: sched_clock: Marking stable (848002967, 217177943)->(1128011226, -62830316) Sep 13 01:09:50.712079 kernel: registered taskstats version 1 Sep 13 01:09:50.712085 kernel: Loading compiled-in X.509 certificates Sep 13 01:09:50.712091 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 01:09:50.712097 kernel: Key type .fscrypt registered Sep 13 01:09:50.712103 kernel: Key type fscrypt-provisioning registered Sep 13 01:09:50.712109 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 01:09:50.712115 kernel: ima: Allocated hash algorithm: sha1 Sep 13 01:09:50.712121 kernel: ima: No architecture policies found Sep 13 01:09:50.712127 kernel: clk: Disabling unused clocks Sep 13 01:09:50.712133 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 01:09:50.712139 kernel: Write protecting the kernel read-only data: 28672k Sep 13 01:09:50.712145 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 01:09:50.712151 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 01:09:50.712157 kernel: Run /init as init process Sep 13 01:09:50.712164 kernel: with arguments: Sep 13 01:09:50.712170 kernel: /init Sep 13 01:09:50.712176 kernel: with environment: Sep 13 01:09:50.712182 kernel: HOME=/ Sep 13 01:09:50.712187 kernel: TERM=linux Sep 13 01:09:50.712193 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 01:09:50.712200 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:09:50.712208 systemd[1]: Detected virtualization vmware. Sep 13 01:09:50.712216 systemd[1]: Detected architecture x86-64. Sep 13 01:09:50.712221 systemd[1]: Running in initrd. Sep 13 01:09:50.712228 systemd[1]: No hostname configured, using default hostname. Sep 13 01:09:50.712234 systemd[1]: Hostname set to . Sep 13 01:09:50.712240 systemd[1]: Initializing machine ID from random generator. Sep 13 01:09:50.712246 systemd[1]: Queued start job for default target initrd.target. Sep 13 01:09:50.712252 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:09:50.712258 systemd[1]: Reached target cryptsetup.target. Sep 13 01:09:50.712265 systemd[1]: Reached target paths.target. Sep 13 01:09:50.712271 systemd[1]: Reached target slices.target. Sep 13 01:09:50.712277 systemd[1]: Reached target swap.target. Sep 13 01:09:50.712283 systemd[1]: Reached target timers.target. Sep 13 01:09:50.712289 systemd[1]: Listening on iscsid.socket. Sep 13 01:09:50.712295 systemd[1]: Listening on iscsiuio.socket. Sep 13 01:09:50.712301 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 01:09:50.712307 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 01:09:50.712314 systemd[1]: Listening on systemd-journald.socket. Sep 13 01:09:50.712321 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:09:50.712328 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:09:50.712334 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:09:50.712340 systemd[1]: Reached target sockets.target. Sep 13 01:09:50.712346 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:09:50.712352 systemd[1]: Finished network-cleanup.service. Sep 13 01:09:50.712358 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 01:09:50.712364 systemd[1]: Starting systemd-journald.service... Sep 13 01:09:50.712371 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:09:50.712377 systemd[1]: Starting systemd-resolved.service... Sep 13 01:09:50.712383 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 01:09:50.712389 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:09:50.712395 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 01:09:50.712401 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 01:09:50.712408 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 01:09:50.712414 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 01:09:50.712420 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 01:09:50.712427 kernel: audit: type=1130 audit(1757725790.655:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.712433 kernel: audit: type=1130 audit(1757725790.657:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.712440 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 01:09:50.712446 kernel: audit: type=1130 audit(1757725790.680:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.712452 systemd[1]: Starting dracut-cmdline.service... Sep 13 01:09:50.712458 systemd[1]: Started systemd-resolved.service. Sep 13 01:09:50.712464 systemd[1]: Reached target nss-lookup.target. Sep 13 01:09:50.712472 kernel: audit: type=1130 audit(1757725790.688:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.712478 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 01:09:50.712484 kernel: Bridge firewalling registered Sep 13 01:09:50.712493 systemd-journald[217]: Journal started Sep 13 01:09:50.712524 systemd-journald[217]: Runtime Journal (/run/log/journal/b06a3997b6a74cbc8b262c4974029531) is 4.8M, max 38.8M, 34.0M free. Sep 13 01:09:50.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.652254 systemd-modules-load[218]: Inserted module 'overlay' Sep 13 01:09:50.716383 systemd[1]: Started systemd-journald.service. Sep 13 01:09:50.716398 kernel: audit: type=1130 audit(1757725790.712:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.671952 systemd-resolved[219]: Positive Trust Anchors: Sep 13 01:09:50.671958 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:09:50.671977 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:09:50.684859 systemd-resolved[219]: Defaulting to hostname 'linux'. Sep 13 01:09:50.718815 kernel: SCSI subsystem initialized Sep 13 01:09:50.701264 systemd-modules-load[218]: Inserted module 'br_netfilter' Sep 13 01:09:50.719165 dracut-cmdline[233]: dracut-dracut-053 Sep 13 01:09:50.719165 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Sep 13 01:09:50.719165 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 01:09:50.727130 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 01:09:50.727150 kernel: device-mapper: uevent: version 1.0.3 Sep 13 01:09:50.727158 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 01:09:50.730123 systemd-modules-load[218]: Inserted module 'dm_multipath' Sep 13 01:09:50.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.730477 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:09:50.733266 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:09:50.733775 kernel: audit: type=1130 audit(1757725790.728:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.737542 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:09:50.740818 kernel: audit: type=1130 audit(1757725790.735:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.756775 kernel: Loading iSCSI transport class v2.0-870. Sep 13 01:09:50.768792 kernel: iscsi: registered transport (tcp) Sep 13 01:09:50.786786 kernel: iscsi: registered transport (qla4xxx) Sep 13 01:09:50.786825 kernel: QLogic iSCSI HBA Driver Sep 13 01:09:50.805891 kernel: audit: type=1130 audit(1757725790.801:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:50.803009 systemd[1]: Finished dracut-cmdline.service. Sep 13 01:09:50.803625 systemd[1]: Starting dracut-pre-udev.service... Sep 13 01:09:50.840780 kernel: raid6: avx2x4 gen() 48364 MB/s Sep 13 01:09:50.857773 kernel: raid6: avx2x4 xor() 21355 MB/s Sep 13 01:09:50.874776 kernel: raid6: avx2x2 gen() 53128 MB/s Sep 13 01:09:50.891778 kernel: raid6: avx2x2 xor() 31843 MB/s Sep 13 01:09:50.908779 kernel: raid6: avx2x1 gen() 44868 MB/s Sep 13 01:09:50.925773 kernel: raid6: avx2x1 xor() 27807 MB/s Sep 13 01:09:50.942809 kernel: raid6: sse2x4 gen() 21213 MB/s Sep 13 01:09:50.959774 kernel: raid6: sse2x4 xor() 11909 MB/s Sep 13 01:09:50.976775 kernel: raid6: sse2x2 gen() 21536 MB/s Sep 13 01:09:50.993772 kernel: raid6: sse2x2 xor() 13401 MB/s Sep 13 01:09:51.010772 kernel: raid6: sse2x1 gen() 17972 MB/s Sep 13 01:09:51.027971 kernel: raid6: sse2x1 xor() 8854 MB/s Sep 13 01:09:51.027997 kernel: raid6: using algorithm avx2x2 gen() 53128 MB/s Sep 13 01:09:51.028005 kernel: raid6: .... xor() 31843 MB/s, rmw enabled Sep 13 01:09:51.029150 kernel: raid6: using avx2x2 recovery algorithm Sep 13 01:09:51.037775 kernel: xor: automatically using best checksumming function avx Sep 13 01:09:51.098782 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 01:09:51.103275 systemd[1]: Finished dracut-pre-udev.service. Sep 13 01:09:51.103900 systemd[1]: Starting systemd-udevd.service... Sep 13 01:09:51.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:51.101000 audit: BPF prog-id=7 op=LOAD Sep 13 01:09:51.101000 audit: BPF prog-id=8 op=LOAD Sep 13 01:09:51.106791 kernel: audit: type=1130 audit(1757725791.101:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:51.114177 systemd-udevd[416]: Using default interface naming scheme 'v252'. Sep 13 01:09:51.116924 systemd[1]: Started systemd-udevd.service. Sep 13 01:09:51.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:51.117480 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 01:09:51.124585 dracut-pre-trigger[417]: rd.md=0: removing MD RAID activation Sep 13 01:09:51.140089 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 01:09:51.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:51.140628 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:09:51.205214 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:09:51.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:51.256779 kernel: VMware PVSCSI driver - version 1.0.7.0-k Sep 13 01:09:51.256810 kernel: vmw_pvscsi: using 64bit dma Sep 13 01:09:51.257798 kernel: vmw_pvscsi: max_id: 16 Sep 13 01:09:51.257814 kernel: vmw_pvscsi: setting ring_pages to 8 Sep 13 01:09:51.271039 kernel: vmw_pvscsi: enabling reqCallThreshold Sep 13 01:09:51.271071 kernel: vmw_pvscsi: driver-based request coalescing enabled Sep 13 01:09:51.271080 kernel: vmw_pvscsi: using MSI-X Sep 13 01:09:51.271087 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Sep 13 01:09:51.273046 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Sep 13 01:09:51.274258 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Sep 13 01:09:51.275879 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Sep 13 01:09:51.277273 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Sep 13 01:09:51.277341 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Sep 13 01:09:51.286778 kernel: libata version 3.00 loaded. Sep 13 01:09:51.290942 kernel: ata_piix 0000:00:07.1: version 2.13 Sep 13 01:09:51.293623 kernel: scsi host1: ata_piix Sep 13 01:09:51.293736 kernel: scsi host2: ata_piix Sep 13 01:09:51.293850 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Sep 13 01:09:51.293864 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Sep 13 01:09:51.295774 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 01:09:51.302774 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Sep 13 01:09:51.461788 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Sep 13 01:09:51.467780 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Sep 13 01:09:51.476775 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 01:09:51.477773 kernel: AES CTR mode by8 optimization enabled Sep 13 01:09:51.483424 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Sep 13 01:09:51.534444 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 01:09:51.534566 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Sep 13 01:09:51.534656 kernel: sd 0:0:0:0: [sda] Cache data unavailable Sep 13 01:09:51.534742 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Sep 13 01:09:51.534846 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:09:51.534862 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 01:09:51.559306 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Sep 13 01:09:51.576780 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 01:09:51.576803 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Sep 13 01:09:51.603773 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (465) Sep 13 01:09:51.604313 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 01:09:51.609145 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:09:51.612575 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 01:09:51.612725 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 01:09:51.614809 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 01:09:51.615343 systemd[1]: Starting disk-uuid.service... Sep 13 01:09:51.635777 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:09:51.640774 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:09:52.681803 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:09:52.682078 disk-uuid[549]: The operation has completed successfully. Sep 13 01:09:52.729978 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 01:09:52.730032 systemd[1]: Finished disk-uuid.service. Sep 13 01:09:52.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:52.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:52.730594 systemd[1]: Starting verity-setup.service... Sep 13 01:09:52.740777 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 13 01:09:52.886314 systemd[1]: Found device dev-mapper-usr.device. Sep 13 01:09:52.887151 systemd[1]: Mounting sysusr-usr.mount... Sep 13 01:09:52.888550 systemd[1]: Finished verity-setup.service. Sep 13 01:09:52.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:52.941779 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 01:09:52.942039 systemd[1]: Mounted sysusr-usr.mount. Sep 13 01:09:52.942623 systemd[1]: Starting afterburn-network-kargs.service... Sep 13 01:09:52.943090 systemd[1]: Starting ignition-setup.service... Sep 13 01:09:52.961452 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 01:09:52.961476 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:09:52.961487 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:09:52.967771 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 13 01:09:52.974633 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 01:09:52.979029 systemd[1]: Finished ignition-setup.service. Sep 13 01:09:52.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:52.980018 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 01:09:53.026372 systemd[1]: Finished afterburn-network-kargs.service. Sep 13 01:09:53.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.027019 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 01:09:53.072070 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 01:09:53.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.070000 audit: BPF prog-id=9 op=LOAD Sep 13 01:09:53.072964 systemd[1]: Starting systemd-networkd.service... Sep 13 01:09:53.087349 systemd-networkd[732]: lo: Link UP Sep 13 01:09:53.087917 systemd-networkd[732]: lo: Gained carrier Sep 13 01:09:53.088353 systemd-networkd[732]: Enumeration completed Sep 13 01:09:53.088528 systemd[1]: Started systemd-networkd.service. Sep 13 01:09:53.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.088693 systemd[1]: Reached target network.target. Sep 13 01:09:53.089005 systemd-networkd[732]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Sep 13 01:09:53.089312 systemd[1]: Starting iscsiuio.service... Sep 13 01:09:53.092515 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Sep 13 01:09:53.092657 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Sep 13 01:09:53.093121 systemd[1]: Started iscsiuio.service. Sep 13 01:09:53.093564 systemd-networkd[732]: ens192: Link UP Sep 13 01:09:53.093684 systemd-networkd[732]: ens192: Gained carrier Sep 13 01:09:53.093727 systemd[1]: Starting iscsid.service... Sep 13 01:09:53.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.096008 iscsid[737]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:09:53.096008 iscsid[737]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 01:09:53.096008 iscsid[737]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 01:09:53.096008 iscsid[737]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 01:09:53.096008 iscsid[737]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:09:53.096008 iscsid[737]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 01:09:53.097186 systemd[1]: Started iscsid.service. Sep 13 01:09:53.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.097868 systemd[1]: Starting dracut-initqueue.service... Sep 13 01:09:53.105352 systemd[1]: Finished dracut-initqueue.service. Sep 13 01:09:53.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.105661 systemd[1]: Reached target remote-fs-pre.target. Sep 13 01:09:53.105927 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:09:53.106139 systemd[1]: Reached target remote-fs.target. Sep 13 01:09:53.106785 systemd[1]: Starting dracut-pre-mount.service... Sep 13 01:09:53.111856 systemd[1]: Finished dracut-pre-mount.service. Sep 13 01:09:53.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.222664 ignition[604]: Ignition 2.14.0 Sep 13 01:09:53.222671 ignition[604]: Stage: fetch-offline Sep 13 01:09:53.222706 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:09:53.222727 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 01:09:53.225692 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 01:09:53.225769 ignition[604]: parsed url from cmdline: "" Sep 13 01:09:53.225773 ignition[604]: no config URL provided Sep 13 01:09:53.225776 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 01:09:53.225782 ignition[604]: no config at "/usr/lib/ignition/user.ign" Sep 13 01:09:53.231279 ignition[604]: config successfully fetched Sep 13 01:09:53.231292 ignition[604]: parsing config with SHA512: c8ce60221618c67b2a524d058aba201bfc74e6dcec3b4c59bd0acdce11d7b4997893a9a9001bfd2b58bc3c72fc29707c3b2c3ec29b87dd1c1c5e535e33b3c7a4 Sep 13 01:09:53.234999 unknown[604]: fetched base config from "system" Sep 13 01:09:53.235005 unknown[604]: fetched user config from "vmware" Sep 13 01:09:53.235215 ignition[604]: fetch-offline: fetch-offline passed Sep 13 01:09:53.235258 ignition[604]: Ignition finished successfully Sep 13 01:09:53.236191 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 01:09:53.236361 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Sep 13 01:09:53.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.236867 systemd[1]: Starting ignition-kargs.service... Sep 13 01:09:53.242395 ignition[752]: Ignition 2.14.0 Sep 13 01:09:53.242639 ignition[752]: Stage: kargs Sep 13 01:09:53.242820 ignition[752]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:09:53.242975 ignition[752]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 01:09:53.244356 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 01:09:53.245833 ignition[752]: kargs: kargs passed Sep 13 01:09:53.245868 ignition[752]: Ignition finished successfully Sep 13 01:09:53.246759 systemd[1]: Finished ignition-kargs.service. Sep 13 01:09:53.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.247346 systemd[1]: Starting ignition-disks.service... Sep 13 01:09:53.251691 ignition[758]: Ignition 2.14.0 Sep 13 01:09:53.251901 ignition[758]: Stage: disks Sep 13 01:09:53.252072 ignition[758]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:09:53.252225 ignition[758]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 01:09:53.253627 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 01:09:53.255219 ignition[758]: disks: disks passed Sep 13 01:09:53.255359 ignition[758]: Ignition finished successfully Sep 13 01:09:53.255923 systemd[1]: Finished ignition-disks.service. Sep 13 01:09:53.256095 systemd[1]: Reached target initrd-root-device.target. Sep 13 01:09:53.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.256204 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:09:53.256348 systemd[1]: Reached target local-fs.target. Sep 13 01:09:53.256501 systemd[1]: Reached target sysinit.target. Sep 13 01:09:53.256706 systemd[1]: Reached target basic.target. Sep 13 01:09:53.257312 systemd[1]: Starting systemd-fsck-root.service... Sep 13 01:09:53.267441 systemd-fsck[766]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 13 01:09:53.268843 systemd[1]: Finished systemd-fsck-root.service. Sep 13 01:09:53.269348 systemd[1]: Mounting sysroot.mount... Sep 13 01:09:53.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.386872 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 01:09:53.387193 systemd[1]: Mounted sysroot.mount. Sep 13 01:09:53.387359 systemd[1]: Reached target initrd-root-fs.target. Sep 13 01:09:53.399464 systemd[1]: Mounting sysroot-usr.mount... Sep 13 01:09:53.399852 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 13 01:09:53.399878 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 01:09:53.399893 systemd[1]: Reached target ignition-diskful.target. Sep 13 01:09:53.401289 systemd[1]: Mounted sysroot-usr.mount. Sep 13 01:09:53.401897 systemd[1]: Starting initrd-setup-root.service... Sep 13 01:09:53.414615 initrd-setup-root[776]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 01:09:53.438397 initrd-setup-root[784]: cut: /sysroot/etc/group: No such file or directory Sep 13 01:09:53.442405 initrd-setup-root[792]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 01:09:53.445130 initrd-setup-root[800]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 01:09:53.478558 systemd[1]: Finished initrd-setup-root.service. Sep 13 01:09:53.479106 systemd[1]: Starting ignition-mount.service... Sep 13 01:09:53.479536 systemd[1]: Starting sysroot-boot.service... Sep 13 01:09:53.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.483322 bash[817]: umount: /sysroot/usr/share/oem: not mounted. Sep 13 01:09:53.488448 ignition[818]: INFO : Ignition 2.14.0 Sep 13 01:09:53.488448 ignition[818]: INFO : Stage: mount Sep 13 01:09:53.488792 ignition[818]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:09:53.488792 ignition[818]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 01:09:53.489935 ignition[818]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 01:09:53.491171 ignition[818]: INFO : mount: mount passed Sep 13 01:09:53.491171 ignition[818]: INFO : Ignition finished successfully Sep 13 01:09:53.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.491738 systemd[1]: Finished ignition-mount.service. Sep 13 01:09:53.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:53.501066 systemd[1]: Finished sysroot-boot.service. Sep 13 01:09:53.907219 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 01:09:53.988786 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (827) Sep 13 01:09:53.999244 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 01:09:53.999260 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:09:53.999268 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:09:54.027779 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 13 01:09:54.029104 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 01:09:54.029642 systemd[1]: Starting ignition-files.service... Sep 13 01:09:54.038441 ignition[847]: INFO : Ignition 2.14.0 Sep 13 01:09:54.038659 ignition[847]: INFO : Stage: files Sep 13 01:09:54.038846 ignition[847]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:09:54.038999 ignition[847]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 01:09:54.040503 ignition[847]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 01:09:54.042566 ignition[847]: DEBUG : files: compiled without relabeling support, skipping Sep 13 01:09:54.043079 ignition[847]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 01:09:54.043232 ignition[847]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 01:09:54.045852 ignition[847]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 01:09:54.046088 ignition[847]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 01:09:54.046862 unknown[847]: wrote ssh authorized keys file for user: core Sep 13 01:09:54.047061 ignition[847]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 01:09:54.047664 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 01:09:54.047925 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 01:09:54.048273 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:09:54.048493 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:09:54.048679 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 01:09:54.048936 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 01:09:54.049323 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Sep 13 01:09:54.049531 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 01:09:54.052910 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3417886205" Sep 13 01:09:54.053105 ignition[847]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3417886205": device or resource busy Sep 13 01:09:54.053105 ignition[847]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3417886205", trying btrfs: device or resource busy Sep 13 01:09:54.053105 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3417886205" Sep 13 01:09:54.053105 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3417886205" Sep 13 01:09:54.054544 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3417886205" Sep 13 01:09:54.054544 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3417886205" Sep 13 01:09:54.054544 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Sep 13 01:09:54.054544 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 01:09:54.054544 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Sep 13 01:09:54.328923 systemd-networkd[732]: ens192: Gained IPv6LL Sep 13 01:09:54.541449 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Sep 13 01:09:55.098544 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 13 01:09:55.103138 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Sep 13 01:09:55.103351 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Sep 13 01:09:55.103351 ignition[847]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Sep 13 01:09:55.420531 ignition[847]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Sep 13 01:09:55.420814 ignition[847]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Sep 13 01:09:55.420814 ignition[847]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:09:55.420814 ignition[847]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:09:55.420814 ignition[847]: INFO : files: files passed Sep 13 01:09:55.420814 ignition[847]: INFO : Ignition finished successfully Sep 13 01:09:55.422587 systemd[1]: Finished ignition-files.service. Sep 13 01:09:55.426328 kernel: kauditd_printk_skb: 24 callbacks suppressed Sep 13 01:09:55.426342 kernel: audit: type=1130 audit(1757725795.420:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.423830 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 01:09:55.426386 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 01:09:55.426835 systemd[1]: Starting ignition-quench.service... Sep 13 01:09:55.429233 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 01:09:55.429287 systemd[1]: Finished ignition-quench.service. Sep 13 01:09:55.434190 kernel: audit: type=1130 audit(1757725795.427:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.434204 kernel: audit: type=1131 audit(1757725795.427:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.434255 initrd-setup-root-after-ignition[873]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 01:09:55.434747 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 01:09:55.435009 systemd[1]: Reached target ignition-complete.target. Sep 13 01:09:55.437724 kernel: audit: type=1130 audit(1757725795.433:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.438108 systemd[1]: Starting initrd-parse-etc.service... Sep 13 01:09:55.447614 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 01:09:55.447886 systemd[1]: Finished initrd-parse-etc.service. Sep 13 01:09:55.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.448196 systemd[1]: Reached target initrd-fs.target. Sep 13 01:09:55.453859 kernel: audit: type=1130 audit(1757725795.446:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.453875 kernel: audit: type=1131 audit(1757725795.446:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.453115 systemd[1]: Reached target initrd.target. Sep 13 01:09:55.453220 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 01:09:55.454222 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 01:09:55.461054 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 01:09:55.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.461757 systemd[1]: Starting initrd-cleanup.service... Sep 13 01:09:55.464811 kernel: audit: type=1130 audit(1757725795.459:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.469188 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 01:09:55.469259 systemd[1]: Finished initrd-cleanup.service. Sep 13 01:09:55.469536 systemd[1]: Stopped target nss-lookup.target. Sep 13 01:09:55.474308 kernel: audit: type=1130 audit(1757725795.467:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.474320 kernel: audit: type=1131 audit(1757725795.467:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.469649 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 01:09:55.474375 systemd[1]: Stopped target timers.target. Sep 13 01:09:55.474601 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 01:09:55.474627 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 01:09:55.477273 kernel: audit: type=1131 audit(1757725795.473:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.474759 systemd[1]: Stopped target initrd.target. Sep 13 01:09:55.477187 systemd[1]: Stopped target basic.target. Sep 13 01:09:55.477328 systemd[1]: Stopped target ignition-complete.target. Sep 13 01:09:55.477492 systemd[1]: Stopped target ignition-diskful.target. Sep 13 01:09:55.477641 systemd[1]: Stopped target initrd-root-device.target. Sep 13 01:09:55.477834 systemd[1]: Stopped target remote-fs.target. Sep 13 01:09:55.477993 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 01:09:55.478161 systemd[1]: Stopped target sysinit.target. Sep 13 01:09:55.478313 systemd[1]: Stopped target local-fs.target. Sep 13 01:09:55.478466 systemd[1]: Stopped target local-fs-pre.target. Sep 13 01:09:55.478643 systemd[1]: Stopped target swap.target. Sep 13 01:09:55.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.478804 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 01:09:55.478827 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 01:09:55.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.478986 systemd[1]: Stopped target cryptsetup.target. Sep 13 01:09:55.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.479117 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 01:09:55.479139 systemd[1]: Stopped dracut-initqueue.service. Sep 13 01:09:55.479312 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 01:09:55.479332 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 01:09:55.479463 systemd[1]: Stopped target paths.target. Sep 13 01:09:55.479601 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 01:09:55.480792 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 01:09:55.480896 systemd[1]: Stopped target slices.target. Sep 13 01:09:55.481059 systemd[1]: Stopped target sockets.target. Sep 13 01:09:55.481232 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 01:09:55.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.481255 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 01:09:55.481397 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 01:09:55.481415 systemd[1]: Stopped ignition-files.service. Sep 13 01:09:55.481920 systemd[1]: Stopping ignition-mount.service... Sep 13 01:09:55.482096 systemd[1]: Stopping iscsid.service... Sep 13 01:09:55.483893 iscsid[737]: iscsid shutting down. Sep 13 01:09:55.482487 systemd[1]: Stopping sysroot-boot.service... Sep 13 01:09:55.482588 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 01:09:55.482616 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 01:09:55.482737 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 01:09:55.482757 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 01:09:55.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.484881 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 01:09:55.484938 systemd[1]: Stopped iscsid.service. Sep 13 01:09:55.485078 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 01:09:55.485092 systemd[1]: Closed iscsid.socket. Sep 13 01:09:55.485207 systemd[1]: Stopping iscsiuio.service... Sep 13 01:09:55.486895 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 01:09:55.486943 systemd[1]: Stopped iscsiuio.service. Sep 13 01:09:55.487069 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 01:09:55.487086 systemd[1]: Closed iscsiuio.socket. Sep 13 01:09:55.489329 ignition[886]: INFO : Ignition 2.14.0 Sep 13 01:09:55.489329 ignition[886]: INFO : Stage: umount Sep 13 01:09:55.489598 ignition[886]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:09:55.489598 ignition[886]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 01:09:55.490639 ignition[886]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 01:09:55.496024 ignition[886]: INFO : umount: umount passed Sep 13 01:09:55.496137 ignition[886]: INFO : Ignition finished successfully Sep 13 01:09:55.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.496457 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 01:09:55.496508 systemd[1]: Stopped ignition-mount.service. Sep 13 01:09:55.496672 systemd[1]: Stopped target network.target. Sep 13 01:09:55.496754 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 01:09:55.496790 systemd[1]: Stopped ignition-disks.service. Sep 13 01:09:55.496892 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 01:09:55.496912 systemd[1]: Stopped ignition-kargs.service. Sep 13 01:09:55.497011 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 01:09:55.497031 systemd[1]: Stopped ignition-setup.service. Sep 13 01:09:55.497181 systemd[1]: Stopping systemd-networkd.service... Sep 13 01:09:55.497304 systemd[1]: Stopping systemd-resolved.service... Sep 13 01:09:55.498293 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 01:09:55.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.501565 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 01:09:55.501613 systemd[1]: Stopped systemd-resolved.service. Sep 13 01:09:55.503000 audit: BPF prog-id=6 op=UNLOAD Sep 13 01:09:55.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.505331 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 01:09:55.505378 systemd[1]: Stopped systemd-networkd.service. Sep 13 01:09:55.505543 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 01:09:55.505561 systemd[1]: Closed systemd-networkd.socket. Sep 13 01:09:55.506026 systemd[1]: Stopping network-cleanup.service... Sep 13 01:09:55.506120 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 01:09:55.506151 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 01:09:55.506282 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Sep 13 01:09:55.506305 systemd[1]: Stopped afterburn-network-kargs.service. Sep 13 01:09:55.506408 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 01:09:55.506428 systemd[1]: Stopped systemd-sysctl.service. Sep 13 01:09:55.506746 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 01:09:55.506782 systemd[1]: Stopped systemd-modules-load.service. Sep 13 01:09:55.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.509000 audit: BPF prog-id=9 op=UNLOAD Sep 13 01:09:55.506924 systemd[1]: Stopping systemd-udevd.service... Sep 13 01:09:55.507599 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 01:09:55.510675 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 01:09:55.510727 systemd[1]: Stopped network-cleanup.service. Sep 13 01:09:55.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.514864 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 01:09:55.514931 systemd[1]: Stopped systemd-udevd.service. Sep 13 01:09:55.515081 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 01:09:55.515101 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 01:09:55.515197 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 01:09:55.515214 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 01:09:55.515300 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 01:09:55.515320 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 01:09:55.515421 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 01:09:55.515440 systemd[1]: Stopped dracut-cmdline.service. Sep 13 01:09:55.515538 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 01:09:55.515557 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 01:09:55.515988 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 01:09:55.516088 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 13 01:09:55.516117 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 13 01:09:55.518243 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 01:09:55.518269 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 01:09:55.518369 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 01:09:55.518389 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 01:09:55.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.519601 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 13 01:09:55.520004 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 01:09:55.520050 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 01:09:55.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.611381 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 01:09:55.611457 systemd[1]: Stopped sysroot-boot.service. Sep 13 01:09:55.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.611704 systemd[1]: Reached target initrd-switch-root.target. Sep 13 01:09:55.611861 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 01:09:55.611893 systemd[1]: Stopped initrd-setup-root.service. Sep 13 01:09:55.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.612562 systemd[1]: Starting initrd-switch-root.service... Sep 13 01:09:55.621734 systemd[1]: Switching root. Sep 13 01:09:55.640480 systemd-journald[217]: Journal stopped Sep 13 01:09:57.563374 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Sep 13 01:09:57.563393 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 01:09:57.563402 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 01:09:57.563408 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 01:09:57.563413 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 01:09:57.563420 kernel: SELinux: policy capability open_perms=1 Sep 13 01:09:57.563426 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 01:09:57.563432 kernel: SELinux: policy capability always_check_network=0 Sep 13 01:09:57.563438 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 01:09:57.563443 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 01:09:57.563449 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 01:09:57.563455 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 01:09:57.563462 systemd[1]: Successfully loaded SELinux policy in 36.821ms. Sep 13 01:09:57.563469 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.410ms. Sep 13 01:09:57.563477 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:09:57.563484 systemd[1]: Detected virtualization vmware. Sep 13 01:09:57.563491 systemd[1]: Detected architecture x86-64. Sep 13 01:09:57.563498 systemd[1]: Detected first boot. Sep 13 01:09:57.563505 systemd[1]: Initializing machine ID from random generator. Sep 13 01:09:57.563512 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 01:09:57.563518 systemd[1]: Populated /etc with preset unit settings. Sep 13 01:09:57.563524 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:09:57.563531 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:09:57.563539 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:09:57.563546 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 01:09:57.563553 systemd[1]: Stopped initrd-switch-root.service. Sep 13 01:09:57.563559 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 01:09:57.563566 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 01:09:57.563573 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 01:09:57.563579 systemd[1]: Created slice system-getty.slice. Sep 13 01:09:57.563585 systemd[1]: Created slice system-modprobe.slice. Sep 13 01:09:57.563593 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 01:09:57.563599 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 01:09:57.563606 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 01:09:57.563612 systemd[1]: Created slice user.slice. Sep 13 01:09:57.563618 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:09:57.563625 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 01:09:57.563631 systemd[1]: Set up automount boot.automount. Sep 13 01:09:57.563638 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 01:09:57.563646 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 01:09:57.563654 systemd[1]: Stopped target initrd-fs.target. Sep 13 01:09:57.563661 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 01:09:57.563668 systemd[1]: Reached target integritysetup.target. Sep 13 01:09:57.563675 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:09:57.563681 systemd[1]: Reached target remote-fs.target. Sep 13 01:09:57.563688 systemd[1]: Reached target slices.target. Sep 13 01:09:57.563695 systemd[1]: Reached target swap.target. Sep 13 01:09:57.563701 systemd[1]: Reached target torcx.target. Sep 13 01:09:57.563710 systemd[1]: Reached target veritysetup.target. Sep 13 01:09:57.563716 systemd[1]: Listening on systemd-coredump.socket. Sep 13 01:09:57.563723 systemd[1]: Listening on systemd-initctl.socket. Sep 13 01:09:57.563730 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:09:57.563736 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:09:57.563744 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:09:57.563752 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 01:09:57.563758 systemd[1]: Mounting dev-hugepages.mount... Sep 13 01:09:57.563774 systemd[1]: Mounting dev-mqueue.mount... Sep 13 01:09:57.563782 systemd[1]: Mounting media.mount... Sep 13 01:09:57.563790 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 01:09:57.563797 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 01:09:57.563804 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 01:09:57.563813 systemd[1]: Mounting tmp.mount... Sep 13 01:09:57.563820 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 01:09:57.563827 systemd[1]: Starting ignition-delete-config.service... Sep 13 01:09:57.563834 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:09:57.563840 systemd[1]: Starting modprobe@configfs.service... Sep 13 01:09:57.563847 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:09:57.563854 systemd[1]: Starting modprobe@drm.service... Sep 13 01:09:57.563861 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:09:57.563868 systemd[1]: Starting modprobe@fuse.service... Sep 13 01:09:57.563875 systemd[1]: Starting modprobe@loop.service... Sep 13 01:09:57.563883 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 01:09:57.563890 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 01:09:57.563897 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 01:09:57.563903 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 01:09:57.563910 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 01:09:57.563917 systemd[1]: Stopped systemd-journald.service. Sep 13 01:09:57.563924 systemd[1]: Starting systemd-journald.service... Sep 13 01:09:57.563931 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:09:57.563939 systemd[1]: Starting systemd-network-generator.service... Sep 13 01:09:57.563946 systemd[1]: Starting systemd-remount-fs.service... Sep 13 01:09:57.563954 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:09:57.563961 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 01:09:57.563967 systemd[1]: Stopped verity-setup.service. Sep 13 01:09:57.563974 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 01:09:57.563981 systemd[1]: Mounted dev-hugepages.mount. Sep 13 01:09:57.563988 systemd[1]: Mounted dev-mqueue.mount. Sep 13 01:09:57.563997 systemd-journald[1020]: Journal started Sep 13 01:09:57.564025 systemd-journald[1020]: Runtime Journal (/run/log/journal/2f80fc08866141809e880f6711965159) is 4.8M, max 38.8M, 34.0M free. Sep 13 01:09:55.735000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 01:09:55.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:09:55.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:09:55.786000 audit: BPF prog-id=10 op=LOAD Sep 13 01:09:55.786000 audit: BPF prog-id=10 op=UNLOAD Sep 13 01:09:55.786000 audit: BPF prog-id=11 op=LOAD Sep 13 01:09:55.786000 audit: BPF prog-id=11 op=UNLOAD Sep 13 01:09:55.887000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 01:09:55.887000 audit[920]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b4 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:09:55.887000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:09:55.889000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 01:09:55.889000 audit[920]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d999 a2=1ed a3=0 items=2 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:09:55.889000 audit: CWD cwd="/" Sep 13 01:09:55.889000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:57.565121 systemd[1]: Started systemd-journald.service. Sep 13 01:09:55.889000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:55.889000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:09:57.463000 audit: BPF prog-id=12 op=LOAD Sep 13 01:09:57.463000 audit: BPF prog-id=3 op=UNLOAD Sep 13 01:09:57.463000 audit: BPF prog-id=13 op=LOAD Sep 13 01:09:57.463000 audit: BPF prog-id=14 op=LOAD Sep 13 01:09:57.463000 audit: BPF prog-id=4 op=UNLOAD Sep 13 01:09:57.463000 audit: BPF prog-id=5 op=UNLOAD Sep 13 01:09:57.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.471000 audit: BPF prog-id=12 op=UNLOAD Sep 13 01:09:57.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.543000 audit: BPF prog-id=15 op=LOAD Sep 13 01:09:57.544000 audit: BPF prog-id=16 op=LOAD Sep 13 01:09:57.544000 audit: BPF prog-id=17 op=LOAD Sep 13 01:09:57.544000 audit: BPF prog-id=13 op=UNLOAD Sep 13 01:09:57.544000 audit: BPF prog-id=14 op=UNLOAD Sep 13 01:09:57.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.559000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 01:09:57.559000 audit[1020]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffd74355f0 a2=4000 a3=7fffd743568c items=0 ppid=1 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:09:57.559000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 01:09:57.462809 systemd[1]: Queued start job for default target multi-user.target. Sep 13 01:09:55.883773 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:09:57.462818 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 01:09:55.886080 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:09:57.465719 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 01:09:55.886094 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:09:55.886116 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 01:09:55.886122 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 01:09:55.886146 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 01:09:55.886154 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 01:09:55.886291 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 01:09:57.566495 jq[987]: true Sep 13 01:09:55.886314 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:09:55.886322 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:09:55.888798 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 01:09:57.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.888820 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 01:09:57.567239 systemd[1]: Mounted media.mount. Sep 13 01:09:55.888831 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 01:09:57.567363 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 01:09:57.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:55.888840 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 01:09:57.567485 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 01:09:55.888858 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 01:09:57.567611 systemd[1]: Mounted tmp.mount. Sep 13 01:09:55.888866 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 01:09:57.568207 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:09:57.234905 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:09:57.568443 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 01:09:57.235058 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:09:57.568514 systemd[1]: Finished modprobe@configfs.service. Sep 13 01:09:57.235119 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:09:57.568720 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:09:57.235221 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:09:57.568798 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:09:57.574140 jq[1029]: true Sep 13 01:09:57.235253 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 01:09:57.569002 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:09:57.235294 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-09-13T01:09:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 01:09:57.569068 systemd[1]: Finished modprobe@drm.service. Sep 13 01:09:57.569266 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:09:57.569332 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:09:57.569567 systemd[1]: Finished systemd-network-generator.service. Sep 13 01:09:57.569814 systemd[1]: Finished systemd-remount-fs.service. Sep 13 01:09:57.570095 systemd[1]: Reached target network-pre.target. Sep 13 01:09:57.571109 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 01:09:57.573199 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 01:09:57.576012 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 01:09:57.576967 systemd[1]: Starting systemd-journal-flush.service... Sep 13 01:09:57.577097 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:09:57.577874 systemd[1]: Starting systemd-random-seed.service... Sep 13 01:09:57.580800 kernel: loop: module loaded Sep 13 01:09:57.580855 systemd-journald[1020]: Time spent on flushing to /var/log/journal/2f80fc08866141809e880f6711965159 is 43.882ms for 1962 entries. Sep 13 01:09:57.580855 systemd-journald[1020]: System Journal (/var/log/journal/2f80fc08866141809e880f6711965159) is 8.0M, max 584.8M, 576.8M free. Sep 13 01:09:57.631622 systemd-journald[1020]: Received client request to flush runtime journal. Sep 13 01:09:57.631653 kernel: fuse: init (API version 7.34) Sep 13 01:09:57.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.579689 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 01:09:57.585258 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:09:57.585339 systemd[1]: Finished modprobe@loop.service. Sep 13 01:09:57.585930 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:09:57.586306 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 01:09:57.586376 systemd[1]: Finished modprobe@fuse.service. Sep 13 01:09:57.587231 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 01:09:57.589290 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 01:09:57.590152 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 01:09:57.591037 systemd[1]: Starting systemd-sysusers.service... Sep 13 01:09:57.597926 systemd[1]: Finished systemd-random-seed.service. Sep 13 01:09:57.598109 systemd[1]: Reached target first-boot-complete.target. Sep 13 01:09:57.603602 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:09:57.604560 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:09:57.625329 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:09:57.632158 systemd[1]: Finished systemd-journal-flush.service. Sep 13 01:09:57.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.640673 systemd[1]: Finished systemd-sysusers.service. Sep 13 01:09:57.641671 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 01:09:57.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.693207 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 01:09:57.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:57.729423 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:09:57.730417 systemd[1]: Starting systemd-udev-settle.service... Sep 13 01:09:57.738983 udevadm[1053]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 01:09:57.750182 ignition[1037]: Ignition 2.14.0 Sep 13 01:09:57.750425 ignition[1037]: deleting config from guestinfo properties Sep 13 01:09:57.754701 ignition[1037]: Successfully deleted config Sep 13 01:09:57.755313 systemd[1]: Finished ignition-delete-config.service. Sep 13 01:09:57.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.011863 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 01:09:58.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.010000 audit: BPF prog-id=18 op=LOAD Sep 13 01:09:58.010000 audit: BPF prog-id=19 op=LOAD Sep 13 01:09:58.011000 audit: BPF prog-id=7 op=UNLOAD Sep 13 01:09:58.011000 audit: BPF prog-id=8 op=UNLOAD Sep 13 01:09:58.013185 systemd[1]: Starting systemd-udevd.service... Sep 13 01:09:58.025923 systemd-udevd[1054]: Using default interface naming scheme 'v252'. Sep 13 01:09:58.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.042000 audit: BPF prog-id=20 op=LOAD Sep 13 01:09:58.043446 systemd[1]: Started systemd-udevd.service. Sep 13 01:09:58.044702 systemd[1]: Starting systemd-networkd.service... Sep 13 01:09:58.051000 audit: BPF prog-id=21 op=LOAD Sep 13 01:09:58.051000 audit: BPF prog-id=22 op=LOAD Sep 13 01:09:58.051000 audit: BPF prog-id=23 op=LOAD Sep 13 01:09:58.054106 systemd[1]: Starting systemd-userdbd.service... Sep 13 01:09:58.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.071737 systemd[1]: Started systemd-userdbd.service. Sep 13 01:09:58.087313 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 01:09:58.124772 systemd-networkd[1063]: lo: Link UP Sep 13 01:09:58.124777 systemd-networkd[1063]: lo: Gained carrier Sep 13 01:09:58.125263 systemd-networkd[1063]: Enumeration completed Sep 13 01:09:58.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.125318 systemd[1]: Started systemd-networkd.service. Sep 13 01:09:58.125325 systemd-networkd[1063]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Sep 13 01:09:58.128120 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Sep 13 01:09:58.128239 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Sep 13 01:09:58.128323 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Sep 13 01:09:58.129465 systemd-networkd[1063]: ens192: Link UP Sep 13 01:09:58.129550 systemd-networkd[1063]: ens192: Gained carrier Sep 13 01:09:58.131779 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Sep 13 01:09:58.153800 kernel: ACPI: button: Power Button [PWRF] Sep 13 01:09:58.196823 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Sep 13 01:09:58.197212 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Sep 13 01:09:58.197286 kernel: Guest personality initialized and is active Sep 13 01:09:58.198785 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Sep 13 01:09:58.198809 kernel: Initialized host personality Sep 13 01:09:58.212000 audit[1058]: AVC avc: denied { confidentiality } for pid=1058 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 01:09:58.217092 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:09:58.212000 audit[1058]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e28b5c0f60 a1=338ec a2=7f244cb2cbc5 a3=5 items=110 ppid=1054 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:09:58.212000 audit: CWD cwd="/" Sep 13 01:09:58.212000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=1 name=(null) inode=16890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=2 name=(null) inode=16890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=3 name=(null) inode=16891 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=4 name=(null) inode=16890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=5 name=(null) inode=16892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=6 name=(null) inode=16890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=7 name=(null) inode=16893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=8 name=(null) inode=16893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=9 name=(null) inode=16894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=10 name=(null) inode=16893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=11 name=(null) inode=16895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=12 name=(null) inode=16893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=13 name=(null) inode=16896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=14 name=(null) inode=16893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=15 name=(null) inode=16897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=16 name=(null) inode=16893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=17 name=(null) inode=16898 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=18 name=(null) inode=16890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=19 name=(null) inode=16899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=20 name=(null) inode=16899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=21 name=(null) inode=16900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=22 name=(null) inode=16899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=23 name=(null) inode=16901 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=24 name=(null) inode=16899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=25 name=(null) inode=16902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=26 name=(null) inode=16899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=27 name=(null) inode=16903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=28 name=(null) inode=16899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=29 name=(null) inode=16904 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=30 name=(null) inode=16890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=31 name=(null) inode=16905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=32 name=(null) inode=16905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=33 name=(null) inode=16906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=34 name=(null) inode=16905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=35 name=(null) inode=16907 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=36 name=(null) inode=16905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=37 name=(null) inode=16908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=38 name=(null) inode=16905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=39 name=(null) inode=16909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=40 name=(null) inode=16905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=41 name=(null) inode=16910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=42 name=(null) inode=16890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=43 name=(null) inode=16911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=44 name=(null) inode=16911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=45 name=(null) inode=16912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=46 name=(null) inode=16911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=47 name=(null) inode=16913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=48 name=(null) inode=16911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=49 name=(null) inode=16914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=50 name=(null) inode=16911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=51 name=(null) inode=16915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=52 name=(null) inode=16911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=53 name=(null) inode=16916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=55 name=(null) inode=16917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=56 name=(null) inode=16917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=57 name=(null) inode=16918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=58 name=(null) inode=16917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=59 name=(null) inode=16919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=60 name=(null) inode=16917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=61 name=(null) inode=16920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=62 name=(null) inode=16920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=63 name=(null) inode=16921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=64 name=(null) inode=16920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=65 name=(null) inode=16922 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=66 name=(null) inode=16920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=67 name=(null) inode=16923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=68 name=(null) inode=16920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=69 name=(null) inode=16924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=70 name=(null) inode=16920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=71 name=(null) inode=16925 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=72 name=(null) inode=16917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=73 name=(null) inode=16926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=74 name=(null) inode=16926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=75 name=(null) inode=16927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=76 name=(null) inode=16926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=77 name=(null) inode=16928 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=78 name=(null) inode=16926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=79 name=(null) inode=16929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=80 name=(null) inode=16926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=81 name=(null) inode=16930 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=82 name=(null) inode=16926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=83 name=(null) inode=16931 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=84 name=(null) inode=16917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=85 name=(null) inode=16932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=86 name=(null) inode=16932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=87 name=(null) inode=16933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=88 name=(null) inode=16932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=89 name=(null) inode=16934 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=90 name=(null) inode=16932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=91 name=(null) inode=16935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=92 name=(null) inode=16932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=93 name=(null) inode=16936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=94 name=(null) inode=16932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=95 name=(null) inode=16937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=96 name=(null) inode=16917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=97 name=(null) inode=16938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=98 name=(null) inode=16938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=99 name=(null) inode=16939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=100 name=(null) inode=16938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=101 name=(null) inode=16940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=102 name=(null) inode=16938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=103 name=(null) inode=16941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=104 name=(null) inode=16938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=105 name=(null) inode=16942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=106 name=(null) inode=16938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=107 name=(null) inode=16943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PATH item=109 name=(null) inode=16944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:09:58.212000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 01:09:58.226775 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Sep 13 01:09:58.229550 (udev-worker)[1069]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Sep 13 01:09:58.233793 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Sep 13 01:09:58.236775 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 01:09:58.261978 systemd[1]: Finished systemd-udev-settle.service. Sep 13 01:09:58.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.262929 systemd[1]: Starting lvm2-activation-early.service... Sep 13 01:09:58.279318 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:09:58.298350 systemd[1]: Finished lvm2-activation-early.service. Sep 13 01:09:58.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.298561 systemd[1]: Reached target cryptsetup.target. Sep 13 01:09:58.299655 systemd[1]: Starting lvm2-activation.service... Sep 13 01:09:58.302724 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:09:58.323254 systemd[1]: Finished lvm2-activation.service. Sep 13 01:09:58.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.323418 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:09:58.324122 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 01:09:58.330327 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 01:09:58.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.563363 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 01:09:58.563390 systemd[1]: Reached target local-fs.target. Sep 13 01:09:58.563535 systemd[1]: Reached target machines.target. Sep 13 01:09:58.564727 systemd[1]: Starting ldconfig.service... Sep 13 01:09:58.565339 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:09:58.565375 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:09:58.566295 systemd[1]: Starting systemd-boot-update.service... Sep 13 01:09:58.567349 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 01:09:58.568343 systemd[1]: Starting systemd-sysext.service... Sep 13 01:09:58.574024 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1092 (bootctl) Sep 13 01:09:58.574638 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 01:09:58.589831 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 01:09:58.598754 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 01:09:58.598862 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 01:09:58.615776 kernel: loop0: detected capacity change from 0 to 221472 Sep 13 01:09:58.930219 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 01:09:58.931122 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 01:09:58.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.947061 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 01:09:58.959079 systemd-fsck[1099]: fsck.fat 4.2 (2021-01-31) Sep 13 01:09:58.959079 systemd-fsck[1099]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 01:09:58.960174 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 01:09:58.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.961153 systemd[1]: Mounting boot.mount... Sep 13 01:09:58.965780 kernel: loop1: detected capacity change from 0 to 221472 Sep 13 01:09:58.968889 systemd[1]: Mounted boot.mount. Sep 13 01:09:58.978822 systemd[1]: Finished systemd-boot-update.service. Sep 13 01:09:58.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.985968 (sd-sysext)[1105]: Using extensions 'kubernetes'. Sep 13 01:09:58.986422 (sd-sysext)[1105]: Merged extensions into '/usr'. Sep 13 01:09:58.996537 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 01:09:58.997463 systemd[1]: Mounting usr-share-oem.mount... Sep 13 01:09:58.998189 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:09:58.999731 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:09:59.000430 systemd[1]: Starting modprobe@loop.service... Sep 13 01:09:59.000585 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:09:59.000679 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:09:59.000767 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 01:09:59.001268 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:09:59.001341 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:09:58.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:58.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.002705 systemd[1]: Mounted usr-share-oem.mount. Sep 13 01:09:59.004118 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:09:59.004187 systemd[1]: Finished modprobe@loop.service. Sep 13 01:09:59.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.004481 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:09:59.004735 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:09:59.004826 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:09:59.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.005102 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:09:59.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.005665 systemd[1]: Finished systemd-sysext.service. Sep 13 01:09:59.006529 systemd[1]: Starting ensure-sysext.service... Sep 13 01:09:59.007360 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 01:09:59.012041 systemd[1]: Reloading. Sep 13 01:09:59.020477 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 01:09:59.021886 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 01:09:59.023275 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 01:09:59.051743 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-09-13T01:09:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:09:59.051768 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-09-13T01:09:59Z" level=info msg="torcx already run" Sep 13 01:09:59.131552 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:09:59.131660 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:09:59.149602 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:09:59.194000 audit: BPF prog-id=24 op=LOAD Sep 13 01:09:59.194000 audit: BPF prog-id=20 op=UNLOAD Sep 13 01:09:59.195000 audit: BPF prog-id=25 op=LOAD Sep 13 01:09:59.195000 audit: BPF prog-id=21 op=UNLOAD Sep 13 01:09:59.195000 audit: BPF prog-id=26 op=LOAD Sep 13 01:09:59.195000 audit: BPF prog-id=27 op=LOAD Sep 13 01:09:59.195000 audit: BPF prog-id=22 op=UNLOAD Sep 13 01:09:59.195000 audit: BPF prog-id=23 op=UNLOAD Sep 13 01:09:59.196000 audit: BPF prog-id=28 op=LOAD Sep 13 01:09:59.196000 audit: BPF prog-id=15 op=UNLOAD Sep 13 01:09:59.196000 audit: BPF prog-id=29 op=LOAD Sep 13 01:09:59.196000 audit: BPF prog-id=30 op=LOAD Sep 13 01:09:59.196000 audit: BPF prog-id=16 op=UNLOAD Sep 13 01:09:59.196000 audit: BPF prog-id=17 op=UNLOAD Sep 13 01:09:59.196000 audit: BPF prog-id=31 op=LOAD Sep 13 01:09:59.196000 audit: BPF prog-id=32 op=LOAD Sep 13 01:09:59.196000 audit: BPF prog-id=18 op=UNLOAD Sep 13 01:09:59.196000 audit: BPF prog-id=19 op=UNLOAD Sep 13 01:09:59.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.199511 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 01:09:59.202112 systemd[1]: Starting audit-rules.service... Sep 13 01:09:59.202885 systemd[1]: Starting clean-ca-certificates.service... Sep 13 01:09:59.203850 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 01:09:59.204000 audit: BPF prog-id=33 op=LOAD Sep 13 01:09:59.205000 audit: BPF prog-id=34 op=LOAD Sep 13 01:09:59.206826 systemd[1]: Starting systemd-resolved.service... Sep 13 01:09:59.207955 systemd[1]: Starting systemd-timesyncd.service... Sep 13 01:09:59.208726 systemd[1]: Starting systemd-update-utmp.service... Sep 13 01:09:59.209108 systemd[1]: Finished clean-ca-certificates.service. Sep 13 01:09:59.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.209368 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 01:09:59.217128 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:09:59.217825 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:09:59.218534 systemd[1]: Starting modprobe@loop.service... Sep 13 01:09:59.218659 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:09:59.218727 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:09:59.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.218814 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 01:09:59.219241 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:09:59.219315 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:09:59.220744 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:09:59.220834 systemd[1]: Finished modprobe@loop.service. Sep 13 01:09:59.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.221094 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:09:59.220000 audit[1197]: SYSTEM_BOOT pid=1197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.223126 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:09:59.223947 systemd[1]: Starting modprobe@loop.service... Sep 13 01:09:59.224065 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:09:59.224135 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:09:59.224211 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 01:09:59.226547 systemd[1]: Finished systemd-update-utmp.service. Sep 13 01:09:59.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.226938 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:09:59.227004 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:09:59.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.227304 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:09:59.227367 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:09:59.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.230598 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:09:59.232793 systemd[1]: Starting modprobe@drm.service... Sep 13 01:09:59.234172 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:09:59.234322 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:09:59.234401 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:09:59.235383 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 01:09:59.235527 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 01:09:59.236087 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:09:59.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.236173 systemd[1]: Finished modprobe@loop.service. Sep 13 01:09:59.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.237460 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:09:59.237530 systemd[1]: Finished modprobe@drm.service. Sep 13 01:09:59.240057 systemd[1]: Finished ensure-sysext.service. Sep 13 01:09:59.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.240252 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:09:59.240319 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:09:59.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.240466 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:09:59.244536 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:09:59.244649 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:09:59.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.244810 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:09:59.246371 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 01:09:59.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:09:59.267000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 01:09:59.267000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeae5587a0 a2=420 a3=0 items=0 ppid=1192 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:09:59.267000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 01:09:59.269894 augenrules[1222]: No rules Sep 13 01:09:59.270012 systemd[1]: Started systemd-timesyncd.service. Sep 13 01:09:59.270188 systemd[1]: Reached target time-set.target. Sep 13 01:09:59.270559 systemd[1]: Finished audit-rules.service. Sep 13 01:09:59.278459 ldconfig[1091]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 01:09:59.280530 systemd[1]: Finished ldconfig.service. Sep 13 01:09:59.281533 systemd[1]: Starting systemd-update-done.service... Sep 13 01:11:32.049205 systemd-timesyncd[1196]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Sep 13 01:11:32.049266 systemd-timesyncd[1196]: Initial clock synchronization to Sat 2025-09-13 01:11:32.049124 UTC. Sep 13 01:11:32.052053 systemd[1]: Finished systemd-update-done.service. Sep 13 01:11:32.058634 systemd-resolved[1195]: Positive Trust Anchors: Sep 13 01:11:32.058767 systemd-resolved[1195]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:11:32.058837 systemd-resolved[1195]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:11:32.078206 systemd-resolved[1195]: Defaulting to hostname 'linux'. Sep 13 01:11:32.079221 systemd[1]: Started systemd-resolved.service. Sep 13 01:11:32.079356 systemd[1]: Reached target network.target. Sep 13 01:11:32.079447 systemd[1]: Reached target nss-lookup.target. Sep 13 01:11:32.079539 systemd[1]: Reached target sysinit.target. Sep 13 01:11:32.079672 systemd[1]: Started motdgen.path. Sep 13 01:11:32.079808 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 01:11:32.079990 systemd[1]: Started logrotate.timer. Sep 13 01:11:32.080123 systemd[1]: Started mdadm.timer. Sep 13 01:11:32.080206 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 01:11:32.080298 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 01:11:32.080315 systemd[1]: Reached target paths.target. Sep 13 01:11:32.080395 systemd[1]: Reached target timers.target. Sep 13 01:11:32.080620 systemd[1]: Listening on dbus.socket. Sep 13 01:11:32.081413 systemd[1]: Starting docker.socket... Sep 13 01:11:32.083137 systemd[1]: Listening on sshd.socket. Sep 13 01:11:32.083296 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:11:32.083532 systemd[1]: Listening on docker.socket. Sep 13 01:11:32.083657 systemd[1]: Reached target sockets.target. Sep 13 01:11:32.083746 systemd[1]: Reached target basic.target. Sep 13 01:11:32.083855 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:11:32.083873 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:11:32.084493 systemd[1]: Starting containerd.service... Sep 13 01:11:32.085240 systemd[1]: Starting dbus.service... Sep 13 01:11:32.086204 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 01:11:32.087056 systemd[1]: Starting extend-filesystems.service... Sep 13 01:11:32.087439 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 01:11:32.088176 systemd[1]: Starting motdgen.service... Sep 13 01:11:32.089521 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 01:11:32.090709 systemd[1]: Starting sshd-keygen.service... Sep 13 01:11:32.091252 jq[1233]: false Sep 13 01:11:32.094236 systemd[1]: Starting systemd-logind.service... Sep 13 01:11:32.094355 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:11:32.094397 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 01:11:32.094882 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 01:11:32.095316 systemd[1]: Starting update-engine.service... Sep 13 01:11:32.096124 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 01:11:32.097032 systemd[1]: Starting vmtoolsd.service... Sep 13 01:11:32.098219 jq[1244]: true Sep 13 01:11:32.098751 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 01:11:32.099075 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 01:11:32.106554 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 01:11:32.106660 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 01:11:32.108087 jq[1248]: true Sep 13 01:11:32.119646 extend-filesystems[1234]: Found loop1 Sep 13 01:11:32.119666 systemd[1]: Started vmtoolsd.service. Sep 13 01:11:32.123509 extend-filesystems[1234]: Found sda Sep 13 01:11:32.123757 extend-filesystems[1234]: Found sda1 Sep 13 01:11:32.123903 extend-filesystems[1234]: Found sda2 Sep 13 01:11:32.124167 extend-filesystems[1234]: Found sda3 Sep 13 01:11:32.125097 extend-filesystems[1234]: Found usr Sep 13 01:11:32.125281 extend-filesystems[1234]: Found sda4 Sep 13 01:11:32.126089 extend-filesystems[1234]: Found sda6 Sep 13 01:11:32.126250 extend-filesystems[1234]: Found sda7 Sep 13 01:11:32.126441 extend-filesystems[1234]: Found sda9 Sep 13 01:11:32.126597 extend-filesystems[1234]: Checking size of /dev/sda9 Sep 13 01:11:32.137313 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 01:11:32.137420 systemd[1]: Finished motdgen.service. Sep 13 01:11:32.150203 extend-filesystems[1234]: Old size kept for /dev/sda9 Sep 13 01:11:32.150203 extend-filesystems[1234]: Found sr0 Sep 13 01:11:32.151076 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 01:11:32.151200 systemd[1]: Finished extend-filesystems.service. Sep 13 01:11:32.152429 systemd-networkd[1063]: ens192: Gained IPv6LL Sep 13 01:11:32.153796 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 01:11:32.153944 systemd[1]: Reached target network-online.target. Sep 13 01:11:32.155196 systemd[1]: Starting kubelet.service... Sep 13 01:11:32.160000 dbus-daemon[1232]: [system] SELinux support is enabled Sep 13 01:11:32.160073 systemd[1]: Started dbus.service. Sep 13 01:11:32.161334 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 01:11:32.161352 systemd[1]: Reached target system-config.target. Sep 13 01:11:32.161464 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 01:11:32.161477 systemd[1]: Reached target user-config.target. Sep 13 01:11:32.165387 bash[1278]: Updated "/home/core/.ssh/authorized_keys" Sep 13 01:11:32.165550 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 01:11:32.170010 env[1249]: time="2025-09-13T01:11:32.169629475Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 01:11:32.180933 update_engine[1243]: I0913 01:11:32.180095 1243 main.cc:92] Flatcar Update Engine starting Sep 13 01:11:32.183133 systemd[1]: Started update-engine.service. Sep 13 01:11:32.183251 update_engine[1243]: I0913 01:11:32.183146 1243 update_check_scheduler.cc:74] Next update check in 3m37s Sep 13 01:11:32.184373 systemd[1]: Started locksmithd.service. Sep 13 01:11:32.191122 kernel: NET: Registered PF_VSOCK protocol family Sep 13 01:11:32.220758 systemd-logind[1242]: Watching system buttons on /dev/input/event1 (Power Button) Sep 13 01:11:32.220777 systemd-logind[1242]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 01:11:32.221266 env[1249]: time="2025-09-13T01:11:32.221246517Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 01:11:32.221390 env[1249]: time="2025-09-13T01:11:32.221379169Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:11:32.222210 env[1249]: time="2025-09-13T01:11:32.222178693Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:11:32.222756 systemd-logind[1242]: New seat seat0. Sep 13 01:11:32.224273 env[1249]: time="2025-09-13T01:11:32.224260281Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:11:32.224484 env[1249]: time="2025-09-13T01:11:32.224470400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:11:32.224534 env[1249]: time="2025-09-13T01:11:32.224523037Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 01:11:32.224580 env[1249]: time="2025-09-13T01:11:32.224569453Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 01:11:32.224631 env[1249]: time="2025-09-13T01:11:32.224621038Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 01:11:32.224718 env[1249]: time="2025-09-13T01:11:32.224709124Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:11:32.224900 env[1249]: time="2025-09-13T01:11:32.224890108Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:11:32.226234 env[1249]: time="2025-09-13T01:11:32.226220187Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:11:32.226290 env[1249]: time="2025-09-13T01:11:32.226279995Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 01:11:32.226380 env[1249]: time="2025-09-13T01:11:32.226369445Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 01:11:32.226510 env[1249]: time="2025-09-13T01:11:32.226500348Z" level=info msg="metadata content store policy set" policy=shared Sep 13 01:11:32.227560 systemd[1]: Started systemd-logind.service. Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260312883Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260336561Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260355104Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260377210Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260386196Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260394661Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260401436Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260410327Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260446690Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260460391Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260468358Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260475315Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260549950Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 01:11:32.261924 env[1249]: time="2025-09-13T01:11:32.260607318Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260791478Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260808224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260816407Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260848949Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260886315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260893685Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260900138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260911516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260920575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260934574Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260942385Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.260951643Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.261028098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.261037237Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.262288 env[1249]: time="2025-09-13T01:11:32.261043678Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.261959 systemd[1]: Started containerd.service. Sep 13 01:11:32.262563 env[1249]: time="2025-09-13T01:11:32.261049974Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 01:11:32.262563 env[1249]: time="2025-09-13T01:11:32.261058461Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 01:11:32.262563 env[1249]: time="2025-09-13T01:11:32.261065239Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 01:11:32.262563 env[1249]: time="2025-09-13T01:11:32.261085219Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 01:11:32.262563 env[1249]: time="2025-09-13T01:11:32.261129179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.261253435Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.261293323Z" level=info msg="Connect containerd service" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.261312193Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.261708851Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.261861750Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.261885812Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.262127988Z" level=info msg="containerd successfully booted in 0.092907s" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.262222619Z" level=info msg="Start subscribing containerd event" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.262252589Z" level=info msg="Start recovering state" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.262285220Z" level=info msg="Start event monitor" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.262291927Z" level=info msg="Start snapshots syncer" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.262297168Z" level=info msg="Start cni network conf syncer for default" Sep 13 01:11:32.263196 env[1249]: time="2025-09-13T01:11:32.262301364Z" level=info msg="Start streaming server" Sep 13 01:11:32.330092 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 01:11:32.330145 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 01:11:32.453122 locksmithd[1290]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 01:11:32.471607 sshd_keygen[1247]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 01:11:32.485441 systemd[1]: Finished sshd-keygen.service. Sep 13 01:11:32.486652 systemd[1]: Starting issuegen.service... Sep 13 01:11:32.490117 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 01:11:32.490220 systemd[1]: Finished issuegen.service. Sep 13 01:11:32.491341 systemd[1]: Starting systemd-user-sessions.service... Sep 13 01:11:32.495545 systemd[1]: Finished systemd-user-sessions.service. Sep 13 01:11:32.496700 systemd[1]: Started getty@tty1.service. Sep 13 01:11:32.497957 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 01:11:32.498291 systemd[1]: Reached target getty.target. Sep 13 01:11:33.253769 systemd[1]: Started kubelet.service. Sep 13 01:11:33.254092 systemd[1]: Reached target multi-user.target. Sep 13 01:11:33.255073 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 01:11:33.260464 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 01:11:33.260563 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 01:11:33.260739 systemd[1]: Startup finished in 885ms (kernel) + 5.143s (initrd) + 4.807s (userspace) = 10.835s. Sep 13 01:11:33.284231 login[1359]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:11:33.284320 login[1358]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:11:33.291748 systemd[1]: Created slice user-500.slice. Sep 13 01:11:33.292604 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 01:11:33.295243 systemd-logind[1242]: New session 1 of user core. Sep 13 01:11:33.297148 systemd-logind[1242]: New session 2 of user core. Sep 13 01:11:33.300024 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 01:11:33.301031 systemd[1]: Starting user@500.service... Sep 13 01:11:33.303777 (systemd)[1365]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:11:33.368125 systemd[1365]: Queued start job for default target default.target. Sep 13 01:11:33.368605 systemd[1365]: Reached target paths.target. Sep 13 01:11:33.368671 systemd[1365]: Reached target sockets.target. Sep 13 01:11:33.368772 systemd[1365]: Reached target timers.target. Sep 13 01:11:33.368830 systemd[1365]: Reached target basic.target. Sep 13 01:11:33.368938 systemd[1]: Started user@500.service. Sep 13 01:11:33.369653 systemd[1]: Started session-1.scope. Sep 13 01:11:33.370162 systemd[1]: Started session-2.scope. Sep 13 01:11:33.370650 systemd[1365]: Reached target default.target. Sep 13 01:11:33.370786 systemd[1365]: Startup finished in 62ms. Sep 13 01:11:33.815619 kubelet[1362]: E0913 01:11:33.815594 1362 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:11:33.816721 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:11:33.816798 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:11:43.982417 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 01:11:43.982576 systemd[1]: Stopped kubelet.service. Sep 13 01:11:43.983764 systemd[1]: Starting kubelet.service... Sep 13 01:11:44.046428 systemd[1]: Started kubelet.service. Sep 13 01:11:44.087073 kubelet[1394]: E0913 01:11:44.087038 1394 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:11:44.089178 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:11:44.089254 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:11:54.232308 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 01:11:54.232433 systemd[1]: Stopped kubelet.service. Sep 13 01:11:54.233444 systemd[1]: Starting kubelet.service... Sep 13 01:11:54.457590 systemd[1]: Started kubelet.service. Sep 13 01:11:54.499456 kubelet[1404]: E0913 01:11:54.499384 1404 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:11:54.500574 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:11:54.500647 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:12:02.250880 systemd[1]: Created slice system-sshd.slice. Sep 13 01:12:02.251676 systemd[1]: Started sshd@0-139.178.70.101:22-147.75.109.163:42148.service. Sep 13 01:12:02.297053 sshd[1410]: Accepted publickey for core from 147.75.109.163 port 42148 ssh2: RSA SHA256:b0fmbDYCI6ambqfeb/7Iy3EDw3D0a+ywRiAq2jc7cGk Sep 13 01:12:02.297828 sshd[1410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:12:02.300874 systemd[1]: Started session-3.scope. Sep 13 01:12:02.301218 systemd-logind[1242]: New session 3 of user core. Sep 13 01:12:02.349231 systemd[1]: Started sshd@1-139.178.70.101:22-147.75.109.163:42154.service. Sep 13 01:12:02.393698 sshd[1415]: Accepted publickey for core from 147.75.109.163 port 42154 ssh2: RSA SHA256:b0fmbDYCI6ambqfeb/7Iy3EDw3D0a+ywRiAq2jc7cGk Sep 13 01:12:02.394792 sshd[1415]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:12:02.397635 systemd-logind[1242]: New session 4 of user core. Sep 13 01:12:02.398136 systemd[1]: Started session-4.scope. Sep 13 01:12:02.448447 sshd[1415]: pam_unix(sshd:session): session closed for user core Sep 13 01:12:02.450603 systemd[1]: Started sshd@2-139.178.70.101:22-147.75.109.163:42168.service. Sep 13 01:12:02.452319 systemd[1]: sshd@1-139.178.70.101:22-147.75.109.163:42154.service: Deactivated successfully. Sep 13 01:12:02.452684 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 01:12:02.453382 systemd-logind[1242]: Session 4 logged out. Waiting for processes to exit. Sep 13 01:12:02.453940 systemd-logind[1242]: Removed session 4. Sep 13 01:12:02.487002 sshd[1420]: Accepted publickey for core from 147.75.109.163 port 42168 ssh2: RSA SHA256:b0fmbDYCI6ambqfeb/7Iy3EDw3D0a+ywRiAq2jc7cGk Sep 13 01:12:02.488009 sshd[1420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:12:02.491733 systemd[1]: Started session-5.scope. Sep 13 01:12:02.491977 systemd-logind[1242]: New session 5 of user core. Sep 13 01:12:02.540590 sshd[1420]: pam_unix(sshd:session): session closed for user core Sep 13 01:12:02.543384 systemd[1]: Started sshd@3-139.178.70.101:22-147.75.109.163:42178.service. Sep 13 01:12:02.544060 systemd[1]: sshd@2-139.178.70.101:22-147.75.109.163:42168.service: Deactivated successfully. Sep 13 01:12:02.544584 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 01:12:02.545686 systemd-logind[1242]: Session 5 logged out. Waiting for processes to exit. Sep 13 01:12:02.546535 systemd-logind[1242]: Removed session 5. Sep 13 01:12:02.583447 sshd[1426]: Accepted publickey for core from 147.75.109.163 port 42178 ssh2: RSA SHA256:b0fmbDYCI6ambqfeb/7Iy3EDw3D0a+ywRiAq2jc7cGk Sep 13 01:12:02.584628 sshd[1426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:12:02.587766 systemd-logind[1242]: New session 6 of user core. Sep 13 01:12:02.588314 systemd[1]: Started session-6.scope. Sep 13 01:12:02.640136 sshd[1426]: pam_unix(sshd:session): session closed for user core Sep 13 01:12:02.642406 systemd[1]: Started sshd@4-139.178.70.101:22-147.75.109.163:42186.service. Sep 13 01:12:02.643042 systemd[1]: sshd@3-139.178.70.101:22-147.75.109.163:42178.service: Deactivated successfully. Sep 13 01:12:02.643521 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 01:12:02.645298 systemd-logind[1242]: Session 6 logged out. Waiting for processes to exit. Sep 13 01:12:02.646106 systemd-logind[1242]: Removed session 6. Sep 13 01:12:02.681487 sshd[1432]: Accepted publickey for core from 147.75.109.163 port 42186 ssh2: RSA SHA256:b0fmbDYCI6ambqfeb/7Iy3EDw3D0a+ywRiAq2jc7cGk Sep 13 01:12:02.682537 sshd[1432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:12:02.685813 systemd[1]: Started session-7.scope. Sep 13 01:12:02.686268 systemd-logind[1242]: New session 7 of user core. Sep 13 01:12:02.746274 sudo[1436]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 01:12:02.746419 sudo[1436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:12:02.753207 dbus-daemon[1232]: \xd0]'\xe7\xdaU: received setenforce notice (enforcing=1859548656) Sep 13 01:12:02.753292 sudo[1436]: pam_unix(sudo:session): session closed for user root Sep 13 01:12:02.755038 sshd[1432]: pam_unix(sshd:session): session closed for user core Sep 13 01:12:02.757232 systemd[1]: Started sshd@5-139.178.70.101:22-147.75.109.163:42188.service. Sep 13 01:12:02.757526 systemd[1]: sshd@4-139.178.70.101:22-147.75.109.163:42186.service: Deactivated successfully. Sep 13 01:12:02.757921 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 01:12:02.759068 systemd-logind[1242]: Session 7 logged out. Waiting for processes to exit. Sep 13 01:12:02.759724 systemd-logind[1242]: Removed session 7. Sep 13 01:12:02.793955 sshd[1439]: Accepted publickey for core from 147.75.109.163 port 42188 ssh2: RSA SHA256:b0fmbDYCI6ambqfeb/7Iy3EDw3D0a+ywRiAq2jc7cGk Sep 13 01:12:02.795217 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:12:02.798847 systemd[1]: Started session-8.scope. Sep 13 01:12:02.799892 systemd-logind[1242]: New session 8 of user core. Sep 13 01:12:02.851037 sudo[1444]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 01:12:02.851462 sudo[1444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:12:02.853543 sudo[1444]: pam_unix(sudo:session): session closed for user root Sep 13 01:12:02.857056 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 01:12:02.857250 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:12:02.863959 systemd[1]: Stopping audit-rules.service... Sep 13 01:12:02.864000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:12:02.865381 auditctl[1447]: No rules Sep 13 01:12:02.869181 kernel: kauditd_printk_skb: 282 callbacks suppressed Sep 13 01:12:02.869232 kernel: audit: type=1305 audit(1757725922.864:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:12:02.869260 kernel: audit: type=1300 audit(1757725922.864:203): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddc94fa20 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:02.864000 audit[1447]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddc94fa20 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:02.865682 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 01:12:02.865800 systemd[1]: Stopped audit-rules.service. Sep 13 01:12:02.866993 systemd[1]: Starting audit-rules.service... Sep 13 01:12:02.875033 kernel: audit: type=1327 audit(1757725922.864:203): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:12:02.875072 kernel: audit: type=1131 audit(1757725922.864:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.864000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:12:02.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.884760 augenrules[1464]: No rules Sep 13 01:12:02.885229 systemd[1]: Finished audit-rules.service. Sep 13 01:12:02.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.888282 kernel: audit: type=1130 audit(1757725922.884:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.888216 sudo[1443]: pam_unix(sudo:session): session closed for user root Sep 13 01:12:02.887000 audit[1443]: USER_END pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.891495 systemd[1]: Started sshd@6-139.178.70.101:22-147.75.109.163:42190.service. Sep 13 01:12:02.891546 sshd[1439]: pam_unix(sshd:session): session closed for user core Sep 13 01:12:02.894871 kernel: audit: type=1106 audit(1757725922.887:206): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.894903 kernel: audit: type=1104 audit(1757725922.887:207): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.887000 audit[1443]: CRED_DISP pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.894334 systemd[1]: sshd@5-139.178.70.101:22-147.75.109.163:42188.service: Deactivated successfully. Sep 13 01:12:02.894680 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 01:12:02.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:42190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.899630 systemd-logind[1242]: Session 8 logged out. Waiting for processes to exit. Sep 13 01:12:02.900178 kernel: audit: type=1130 audit(1757725922.891:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:42190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.891000 audit[1439]: USER_END pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.904861 systemd-logind[1242]: Removed session 8. Sep 13 01:12:02.905134 kernel: audit: type=1106 audit(1757725922.891:209): pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.905166 kernel: audit: type=1104 audit(1757725922.891:210): pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.891000 audit[1439]: CRED_DISP pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.101:22-147.75.109.163:42188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.934511 sshd[1469]: Accepted publickey for core from 147.75.109.163 port 42190 ssh2: RSA SHA256:b0fmbDYCI6ambqfeb/7Iy3EDw3D0a+ywRiAq2jc7cGk Sep 13 01:12:02.934000 audit[1469]: USER_ACCT pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.935467 sshd[1469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:12:02.934000 audit[1469]: CRED_ACQ pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.934000 audit[1469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc67d64e20 a2=3 a3=0 items=0 ppid=1 pid=1469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:02.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:12:02.937914 systemd-logind[1242]: New session 9 of user core. Sep 13 01:12:02.938340 systemd[1]: Started session-9.scope. Sep 13 01:12:02.940000 audit[1469]: USER_START pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.940000 audit[1472]: CRED_ACQ pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:02.986640 sudo[1473]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 01:12:02.986780 sudo[1473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:12:02.985000 audit[1473]: USER_ACCT pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.985000 audit[1473]: CRED_REFR pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.986000 audit[1473]: USER_START pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:02.992644 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Sep 13 01:12:02.994310 systemd[1]: Starting coreos-metadata.service... Sep 13 01:12:03.007104 systemd[1]: coreos-metadata.service: Deactivated successfully. Sep 13 01:12:03.007245 systemd[1]: Finished coreos-metadata.service. Sep 13 01:12:03.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:03.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:03.439067 systemd[1]: Stopped kubelet.service. Sep 13 01:12:03.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:03.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:03.440455 systemd[1]: Starting kubelet.service... Sep 13 01:12:03.455649 systemd[1]: Reloading. Sep 13 01:12:03.514027 /usr/lib/systemd/system-generators/torcx-generator[1534]: time="2025-09-13T01:12:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:12:03.514043 /usr/lib/systemd/system-generators/torcx-generator[1534]: time="2025-09-13T01:12:03Z" level=info msg="torcx already run" Sep 13 01:12:03.572710 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:12:03.572725 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:12:03.584384 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.622000 audit: BPF prog-id=40 op=LOAD Sep 13 01:12:03.622000 audit: BPF prog-id=34 op=UNLOAD Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit: BPF prog-id=41 op=LOAD Sep 13 01:12:03.623000 audit: BPF prog-id=24 op=UNLOAD Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.623000 audit: BPF prog-id=42 op=LOAD Sep 13 01:12:03.623000 audit: BPF prog-id=38 op=UNLOAD Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit: BPF prog-id=43 op=LOAD Sep 13 01:12:03.624000 audit: BPF prog-id=35 op=UNLOAD Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit: BPF prog-id=44 op=LOAD Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit: BPF prog-id=45 op=LOAD Sep 13 01:12:03.624000 audit: BPF prog-id=36 op=UNLOAD Sep 13 01:12:03.624000 audit: BPF prog-id=37 op=UNLOAD Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit: BPF prog-id=46 op=LOAD Sep 13 01:12:03.625000 audit: BPF prog-id=25 op=UNLOAD Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit: BPF prog-id=47 op=LOAD Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.625000 audit: BPF prog-id=48 op=LOAD Sep 13 01:12:03.625000 audit: BPF prog-id=26 op=UNLOAD Sep 13 01:12:03.625000 audit: BPF prog-id=27 op=UNLOAD Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit: BPF prog-id=49 op=LOAD Sep 13 01:12:03.626000 audit: BPF prog-id=28 op=UNLOAD Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit: BPF prog-id=50 op=LOAD Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit: BPF prog-id=51 op=LOAD Sep 13 01:12:03.626000 audit: BPF prog-id=29 op=UNLOAD Sep 13 01:12:03.626000 audit: BPF prog-id=30 op=UNLOAD Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit: BPF prog-id=52 op=LOAD Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit: BPF prog-id=53 op=LOAD Sep 13 01:12:03.626000 audit: BPF prog-id=31 op=UNLOAD Sep 13 01:12:03.626000 audit: BPF prog-id=32 op=UNLOAD Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:03.627000 audit: BPF prog-id=54 op=LOAD Sep 13 01:12:03.627000 audit: BPF prog-id=33 op=UNLOAD Sep 13 01:12:03.638345 systemd[1]: Started kubelet.service. Sep 13 01:12:03.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:03.639441 systemd[1]: Stopping kubelet.service... Sep 13 01:12:03.639928 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 01:12:03.640043 systemd[1]: Stopped kubelet.service. Sep 13 01:12:03.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:03.641103 systemd[1]: Starting kubelet.service... Sep 13 01:12:04.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:04.049729 systemd[1]: Started kubelet.service. Sep 13 01:12:04.080341 kubelet[1601]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:12:04.080558 kubelet[1601]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 13 01:12:04.080597 kubelet[1601]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:12:04.080695 kubelet[1601]: I0913 01:12:04.080678 1601 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 01:12:04.269735 kubelet[1601]: I0913 01:12:04.269717 1601 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 13 01:12:04.269833 kubelet[1601]: I0913 01:12:04.269825 1601 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 01:12:04.270020 kubelet[1601]: I0913 01:12:04.270011 1601 server.go:934] "Client rotation is on, will bootstrap in background" Sep 13 01:12:04.378891 kubelet[1601]: I0913 01:12:04.378829 1601 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 01:12:04.387240 kubelet[1601]: E0913 01:12:04.387221 1601 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 01:12:04.387359 kubelet[1601]: I0913 01:12:04.387349 1601 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 01:12:04.390531 kubelet[1601]: I0913 01:12:04.390522 1601 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 01:12:04.391429 kubelet[1601]: I0913 01:12:04.391419 1601 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 13 01:12:04.391557 kubelet[1601]: I0913 01:12:04.391543 1601 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 01:12:04.391701 kubelet[1601]: I0913 01:12:04.391601 1601 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.133","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 01:12:04.391801 kubelet[1601]: I0913 01:12:04.391792 1601 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 01:12:04.391847 kubelet[1601]: I0913 01:12:04.391840 1601 container_manager_linux.go:300] "Creating device plugin manager" Sep 13 01:12:04.391942 kubelet[1601]: I0913 01:12:04.391935 1601 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:12:04.394132 kubelet[1601]: I0913 01:12:04.394122 1601 kubelet.go:408] "Attempting to sync node with API server" Sep 13 01:12:04.394187 kubelet[1601]: I0913 01:12:04.394179 1601 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 01:12:04.394244 kubelet[1601]: I0913 01:12:04.394236 1601 kubelet.go:314] "Adding apiserver pod source" Sep 13 01:12:04.394297 kubelet[1601]: I0913 01:12:04.394289 1601 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 01:12:04.402954 kubelet[1601]: E0913 01:12:04.402940 1601 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:04.403047 kubelet[1601]: E0913 01:12:04.403038 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:04.404993 kubelet[1601]: I0913 01:12:04.404978 1601 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 01:12:04.405365 kubelet[1601]: I0913 01:12:04.405264 1601 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 01:12:04.409825 kubelet[1601]: W0913 01:12:04.409805 1601 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 01:12:04.421242 kubelet[1601]: I0913 01:12:04.421064 1601 server.go:1274] "Started kubelet" Sep 13 01:12:04.424977 kubelet[1601]: W0913 01:12:04.424962 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 13 01:12:04.425084 kubelet[1601]: E0913 01:12:04.425072 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 01:12:04.425271 kubelet[1601]: I0913 01:12:04.425249 1601 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 01:12:04.425899 kubelet[1601]: I0913 01:12:04.425890 1601 server.go:449] "Adding debug handlers to kubelet server" Sep 13 01:12:04.425000 audit[1601]: AVC avc: denied { mac_admin } for pid=1601 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:04.425000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:12:04.425000 audit[1601]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008019e0 a1=c000299050 a2=c0008019b0 a3=25 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.425000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:12:04.427317 kubelet[1601]: I0913 01:12:04.427304 1601 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 01:12:04.426000 audit[1601]: AVC avc: denied { mac_admin } for pid=1601 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:04.426000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:12:04.426000 audit[1601]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008fe360 a1=c000299068 a2=c000801a70 a3=25 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.426000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:12:04.427533 kubelet[1601]: I0913 01:12:04.427522 1601 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 13 01:12:04.427609 kubelet[1601]: I0913 01:12:04.427603 1601 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 01:12:04.430558 kubelet[1601]: I0913 01:12:04.430500 1601 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 01:12:04.430663 kubelet[1601]: I0913 01:12:04.430651 1601 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 01:12:04.431160 kubelet[1601]: W0913 01:12:04.431135 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.67.124.133" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 13 01:12:04.431160 kubelet[1601]: E0913 01:12:04.431156 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.67.124.133\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 01:12:04.436527 kubelet[1601]: E0913 01:12:04.434277 1601 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.133.1864b26a599c8f1a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.133,UID:10.67.124.133,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:12:04.421046042 +0000 UTC m=+0.368843017,LastTimestamp:2025-09-13 01:12:04.421046042 +0000 UTC m=+0.368843017,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,}" Sep 13 01:12:04.437272 kubelet[1601]: I0913 01:12:04.437256 1601 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 01:12:04.438509 kubelet[1601]: I0913 01:12:04.438498 1601 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 13 01:12:04.439238 kubelet[1601]: E0913 01:12:04.439223 1601 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 01:12:04.440404 kubelet[1601]: E0913 01:12:04.440366 1601 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.133.1864b26a5ab1cdf8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.133,UID:10.67.124.133,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:12:04.439215608 +0000 UTC m=+0.387012586,LastTimestamp:2025-09-13 01:12:04.439215608 +0000 UTC m=+0.387012586,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,}" Sep 13 01:12:04.441479 kubelet[1601]: E0913 01:12:04.441463 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:04.441835 kubelet[1601]: I0913 01:12:04.441819 1601 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 13 01:12:04.441884 kubelet[1601]: I0913 01:12:04.441872 1601 reconciler.go:26] "Reconciler: start to sync state" Sep 13 01:12:04.445583 kubelet[1601]: I0913 01:12:04.445571 1601 factory.go:221] Registration of the containerd container factory successfully Sep 13 01:12:04.445646 kubelet[1601]: I0913 01:12:04.445639 1601 factory.go:221] Registration of the systemd container factory successfully Sep 13 01:12:04.445743 kubelet[1601]: I0913 01:12:04.445732 1601 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 01:12:04.452866 kubelet[1601]: W0913 01:12:04.452845 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Sep 13 01:12:04.452866 kubelet[1601]: E0913 01:12:04.452870 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 13 01:12:04.453007 kubelet[1601]: E0913 01:12:04.452937 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.133\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 13 01:12:04.459265 kubelet[1601]: I0913 01:12:04.459250 1601 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 13 01:12:04.459372 kubelet[1601]: I0913 01:12:04.459365 1601 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 13 01:12:04.459424 kubelet[1601]: I0913 01:12:04.459417 1601 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:12:04.459822 kubelet[1601]: E0913 01:12:04.459779 1601 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.133.1864b26a5bdc83f3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.133,UID:10.67.124.133,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.133 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:12:04.458791923 +0000 UTC m=+0.406588894,LastTimestamp:2025-09-13 01:12:04.458791923 +0000 UTC m=+0.406588894,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,}" Sep 13 01:12:04.461253 kubelet[1601]: I0913 01:12:04.461245 1601 policy_none.go:49] "None policy: Start" Sep 13 01:12:04.461555 kubelet[1601]: I0913 01:12:04.461548 1601 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 13 01:12:04.461622 kubelet[1601]: I0913 01:12:04.461615 1601 state_mem.go:35] "Initializing new in-memory state store" Sep 13 01:12:04.463038 kubelet[1601]: E0913 01:12:04.462991 1601 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.133.1864b26a5bdccb8f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.133,UID:10.67.124.133,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.133 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:12:04.458810255 +0000 UTC m=+0.406607227,LastTimestamp:2025-09-13 01:12:04.458810255 +0000 UTC m=+0.406607227,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,}" Sep 13 01:12:04.467512 kubelet[1601]: E0913 01:12:04.467275 1601 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.133.1864b26a5bdcd182 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.133,UID:10.67.124.133,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.133 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:12:04.458811778 +0000 UTC m=+0.406608749,LastTimestamp:2025-09-13 01:12:04.458811778 +0000 UTC m=+0.406608749,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,}" Sep 13 01:12:04.467441 systemd[1]: Created slice kubepods.slice. Sep 13 01:12:04.470245 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 01:12:04.472583 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 01:12:04.475000 audit[1615]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.475000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2a293750 a2=0 a3=7ffc2a29373c items=0 ppid=1601 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:12:04.476784 kubelet[1601]: I0913 01:12:04.476773 1601 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 01:12:04.476000 audit[1601]: AVC avc: denied { mac_admin } for pid=1601 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:04.476000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:12:04.476000 audit[1601]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00025edb0 a1=c000c7a708 a2=c00025ed80 a3=25 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.476000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:12:04.477512 kubelet[1601]: I0913 01:12:04.477501 1601 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 01:12:04.477616 kubelet[1601]: I0913 01:12:04.477609 1601 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 01:12:04.477676 kubelet[1601]: I0913 01:12:04.477655 1601 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 01:12:04.477898 kubelet[1601]: I0913 01:12:04.477891 1601 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 01:12:04.479317 kubelet[1601]: E0913 01:12:04.479303 1601 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.133\" not found" Sep 13 01:12:04.478000 audit[1621]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.478000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffeb6f30d40 a2=0 a3=7ffeb6f30d2c items=0 ppid=1601 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:12:04.482025 kubelet[1601]: E0913 01:12:04.481966 1601 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.133.1864b26a5d0dd8a6 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.133,UID:10.67.124.133,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:12:04.478802086 +0000 UTC m=+0.426599057,LastTimestamp:2025-09-13 01:12:04.478802086 +0000 UTC m=+0.426599057,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,}" Sep 13 01:12:04.480000 audit[1623]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.480000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb0fdf530 a2=0 a3=7ffdb0fdf51c items=0 ppid=1601 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:12:04.496000 audit[1628]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.496000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7936dd00 a2=0 a3=7ffd7936dcec items=0 ppid=1601 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:12:04.532000 audit[1633]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.532000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc6f4321c0 a2=0 a3=7ffc6f4321ac items=0 ppid=1601 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 01:12:04.534416 kubelet[1601]: I0913 01:12:04.534390 1601 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 01:12:04.533000 audit[1634]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:04.533000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde15cdbf0 a2=0 a3=7ffde15cdbdc items=0 ppid=1601 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:12:04.535120 kubelet[1601]: I0913 01:12:04.535104 1601 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 01:12:04.535188 kubelet[1601]: I0913 01:12:04.535181 1601 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 13 01:12:04.535320 kubelet[1601]: I0913 01:12:04.535313 1601 kubelet.go:2321] "Starting kubelet main sync loop" Sep 13 01:12:04.535455 kubelet[1601]: E0913 01:12:04.535437 1601 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 01:12:04.534000 audit[1636]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:04.534000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddbf06450 a2=0 a3=7ffddbf0643c items=0 ppid=1601 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:12:04.535000 audit[1635]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.535000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe363cafe0 a2=0 a3=7ffe363cafcc items=0 ppid=1601 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:12:04.535000 audit[1637]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:04.535000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdf7b949f0 a2=0 a3=7ffdf7b949dc items=0 ppid=1601 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:12:04.536000 audit[1639]: NETFILTER_CFG table=filter:11 family=10 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:04.536000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2c0f8e40 a2=0 a3=7ffc2c0f8e2c items=0 ppid=1601 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:12:04.536000 audit[1638]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.536000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc6e083140 a2=0 a3=7ffc6e08312c items=0 ppid=1601 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:12:04.537000 audit[1640]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:04.537000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe17c6a060 a2=0 a3=7ffe17c6a04c items=0 ppid=1601 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:04.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:12:04.541929 kubelet[1601]: W0913 01:12:04.541914 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Sep 13 01:12:04.542047 kubelet[1601]: E0913 01:12:04.542033 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"runtimeclasses\" in API group \"node.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 13 01:12:04.578543 kubelet[1601]: I0913 01:12:04.578526 1601 kubelet_node_status.go:72] "Attempting to register node" node="10.67.124.133" Sep 13 01:12:04.610584 kubelet[1601]: I0913 01:12:04.610565 1601 kubelet_node_status.go:75] "Successfully registered node" node="10.67.124.133" Sep 13 01:12:04.610695 kubelet[1601]: E0913 01:12:04.610684 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": node \"10.67.124.133\" not found" Sep 13 01:12:04.635199 kubelet[1601]: E0913 01:12:04.635127 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:04.735452 kubelet[1601]: E0913 01:12:04.735426 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:04.835724 kubelet[1601]: E0913 01:12:04.835695 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:04.936516 kubelet[1601]: E0913 01:12:04.936444 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.037044 kubelet[1601]: E0913 01:12:05.037017 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.137789 kubelet[1601]: E0913 01:12:05.137681 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.166000 audit[1473]: USER_END pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:05.166000 audit[1473]: CRED_DISP pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:12:05.167774 sudo[1473]: pam_unix(sudo:session): session closed for user root Sep 13 01:12:05.169027 sshd[1469]: pam_unix(sshd:session): session closed for user core Sep 13 01:12:05.168000 audit[1469]: USER_END pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:05.168000 audit[1469]: CRED_DISP pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 01:12:05.170297 systemd[1]: sshd@6-139.178.70.101:22-147.75.109.163:42190.service: Deactivated successfully. Sep 13 01:12:05.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:42190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:12:05.170720 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 01:12:05.171160 systemd-logind[1242]: Session 9 logged out. Waiting for processes to exit. Sep 13 01:12:05.171605 systemd-logind[1242]: Removed session 9. Sep 13 01:12:05.238219 kubelet[1601]: E0913 01:12:05.238196 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.277742 kubelet[1601]: I0913 01:12:05.277659 1601 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 01:12:05.338903 kubelet[1601]: E0913 01:12:05.338878 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.403538 kubelet[1601]: E0913 01:12:05.403501 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:05.439320 kubelet[1601]: E0913 01:12:05.439294 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.540358 kubelet[1601]: E0913 01:12:05.540172 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.640278 kubelet[1601]: E0913 01:12:05.640247 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.740524 kubelet[1601]: E0913 01:12:05.740500 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.841220 kubelet[1601]: E0913 01:12:05.841043 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.67.124.133\" not found" Sep 13 01:12:05.942338 kubelet[1601]: I0913 01:12:05.942322 1601 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 01:12:05.942648 env[1249]: time="2025-09-13T01:12:05.942623935Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 01:12:05.942897 kubelet[1601]: I0913 01:12:05.942889 1601 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 01:12:06.404012 kubelet[1601]: E0913 01:12:06.403978 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:06.404264 kubelet[1601]: I0913 01:12:06.404023 1601 apiserver.go:52] "Watching apiserver" Sep 13 01:12:06.417260 kubelet[1601]: E0913 01:12:06.417236 1601 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l9fgx" podUID="e406acba-8d5c-4e8a-9e2a-233a32847dff" Sep 13 01:12:06.419475 systemd[1]: Created slice kubepods-besteffort-podc2a0985e_6999_4f98_86ad_4bcdfb070437.slice. Sep 13 01:12:06.426879 systemd[1]: Created slice kubepods-besteffort-pod1df86ad7_c474_46e6_9c1d_feb438a896e9.slice. Sep 13 01:12:06.442272 kubelet[1601]: I0913 01:12:06.442253 1601 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 13 01:12:06.451758 kubelet[1601]: I0913 01:12:06.451741 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c7jdj\" (UniqueName: \"kubernetes.io/projected/e406acba-8d5c-4e8a-9e2a-233a32847dff-kube-api-access-c7jdj\") pod \"csi-node-driver-l9fgx\" (UID: \"e406acba-8d5c-4e8a-9e2a-233a32847dff\") " pod="calico-system/csi-node-driver-l9fgx" Sep 13 01:12:06.451900 kubelet[1601]: I0913 01:12:06.451889 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c2a0985e-6999-4f98-86ad-4bcdfb070437-xtables-lock\") pod \"kube-proxy-d85vc\" (UID: \"c2a0985e-6999-4f98-86ad-4bcdfb070437\") " pod="kube-system/kube-proxy-d85vc" Sep 13 01:12:06.451959 kubelet[1601]: I0913 01:12:06.451944 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-var-lib-calico\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452016 kubelet[1601]: I0913 01:12:06.452006 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-var-run-calico\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452066 kubelet[1601]: I0913 01:12:06.452057 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-xtables-lock\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452124 kubelet[1601]: I0913 01:12:06.452107 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-62nw9\" (UniqueName: \"kubernetes.io/projected/1df86ad7-c474-46e6-9c1d-feb438a896e9-kube-api-access-62nw9\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452186 kubelet[1601]: I0913 01:12:06.452177 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e406acba-8d5c-4e8a-9e2a-233a32847dff-kubelet-dir\") pod \"csi-node-driver-l9fgx\" (UID: \"e406acba-8d5c-4e8a-9e2a-233a32847dff\") " pod="calico-system/csi-node-driver-l9fgx" Sep 13 01:12:06.452239 kubelet[1601]: I0913 01:12:06.452230 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-flexvol-driver-host\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452287 kubelet[1601]: I0913 01:12:06.452278 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-lib-modules\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452344 kubelet[1601]: I0913 01:12:06.452331 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1df86ad7-c474-46e6-9c1d-feb438a896e9-node-certs\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452394 kubelet[1601]: I0913 01:12:06.452385 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e406acba-8d5c-4e8a-9e2a-233a32847dff-registration-dir\") pod \"csi-node-driver-l9fgx\" (UID: \"e406acba-8d5c-4e8a-9e2a-233a32847dff\") " pod="calico-system/csi-node-driver-l9fgx" Sep 13 01:12:06.452450 kubelet[1601]: I0913 01:12:06.452441 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e406acba-8d5c-4e8a-9e2a-233a32847dff-varrun\") pod \"csi-node-driver-l9fgx\" (UID: \"e406acba-8d5c-4e8a-9e2a-233a32847dff\") " pod="calico-system/csi-node-driver-l9fgx" Sep 13 01:12:06.452503 kubelet[1601]: I0913 01:12:06.452494 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c2a0985e-6999-4f98-86ad-4bcdfb070437-kube-proxy\") pod \"kube-proxy-d85vc\" (UID: \"c2a0985e-6999-4f98-86ad-4bcdfb070437\") " pod="kube-system/kube-proxy-d85vc" Sep 13 01:12:06.452555 kubelet[1601]: I0913 01:12:06.452546 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1df86ad7-c474-46e6-9c1d-feb438a896e9-tigera-ca-bundle\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452607 kubelet[1601]: I0913 01:12:06.452598 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-cni-bin-dir\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452655 kubelet[1601]: I0913 01:12:06.452646 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-cni-net-dir\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452714 kubelet[1601]: I0913 01:12:06.452705 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-policysync\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452772 kubelet[1601]: I0913 01:12:06.452763 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mtbg9\" (UniqueName: \"kubernetes.io/projected/c2a0985e-6999-4f98-86ad-4bcdfb070437-kube-api-access-mtbg9\") pod \"kube-proxy-d85vc\" (UID: \"c2a0985e-6999-4f98-86ad-4bcdfb070437\") " pod="kube-system/kube-proxy-d85vc" Sep 13 01:12:06.452825 kubelet[1601]: I0913 01:12:06.452816 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1df86ad7-c474-46e6-9c1d-feb438a896e9-cni-log-dir\") pod \"calico-node-wnpn4\" (UID: \"1df86ad7-c474-46e6-9c1d-feb438a896e9\") " pod="calico-system/calico-node-wnpn4" Sep 13 01:12:06.452881 kubelet[1601]: I0913 01:12:06.452873 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e406acba-8d5c-4e8a-9e2a-233a32847dff-socket-dir\") pod \"csi-node-driver-l9fgx\" (UID: \"e406acba-8d5c-4e8a-9e2a-233a32847dff\") " pod="calico-system/csi-node-driver-l9fgx" Sep 13 01:12:06.452955 kubelet[1601]: I0913 01:12:06.452947 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c2a0985e-6999-4f98-86ad-4bcdfb070437-lib-modules\") pod \"kube-proxy-d85vc\" (UID: \"c2a0985e-6999-4f98-86ad-4bcdfb070437\") " pod="kube-system/kube-proxy-d85vc" Sep 13 01:12:06.554742 kubelet[1601]: I0913 01:12:06.554722 1601 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 01:12:06.555234 kubelet[1601]: E0913 01:12:06.555218 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.555276 kubelet[1601]: W0913 01:12:06.555232 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.555276 kubelet[1601]: E0913 01:12:06.555245 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.555332 kubelet[1601]: E0913 01:12:06.555323 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.555332 kubelet[1601]: W0913 01:12:06.555329 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.555380 kubelet[1601]: E0913 01:12:06.555335 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.555411 kubelet[1601]: E0913 01:12:06.555402 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.555411 kubelet[1601]: W0913 01:12:06.555408 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.555462 kubelet[1601]: E0913 01:12:06.555413 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.555509 kubelet[1601]: E0913 01:12:06.555500 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.555509 kubelet[1601]: W0913 01:12:06.555506 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.555557 kubelet[1601]: E0913 01:12:06.555511 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.559245 kubelet[1601]: E0913 01:12:06.559222 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.559245 kubelet[1601]: W0913 01:12:06.559240 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.559307 kubelet[1601]: E0913 01:12:06.559250 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.603599 kubelet[1601]: E0913 01:12:06.603580 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.603599 kubelet[1601]: W0913 01:12:06.603593 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.603685 kubelet[1601]: E0913 01:12:06.603613 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.607588 kubelet[1601]: E0913 01:12:06.607571 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.607588 kubelet[1601]: W0913 01:12:06.607583 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.607680 kubelet[1601]: E0913 01:12:06.607607 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.610476 kubelet[1601]: E0913 01:12:06.610461 1601 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:12:06.610476 kubelet[1601]: W0913 01:12:06.610472 1601 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:12:06.610536 kubelet[1601]: E0913 01:12:06.610479 1601 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:12:06.728035 env[1249]: time="2025-09-13T01:12:06.727003503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d85vc,Uid:c2a0985e-6999-4f98-86ad-4bcdfb070437,Namespace:kube-system,Attempt:0,}" Sep 13 01:12:06.729518 env[1249]: time="2025-09-13T01:12:06.729499270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wnpn4,Uid:1df86ad7-c474-46e6-9c1d-feb438a896e9,Namespace:calico-system,Attempt:0,}" Sep 13 01:12:07.264771 env[1249]: time="2025-09-13T01:12:07.264720672Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.265797 env[1249]: time="2025-09-13T01:12:07.265782058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.266254 env[1249]: time="2025-09-13T01:12:07.266242351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.266691 env[1249]: time="2025-09-13T01:12:07.266677093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.268470 env[1249]: time="2025-09-13T01:12:07.268458455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.269646 env[1249]: time="2025-09-13T01:12:07.269623972Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.270045 env[1249]: time="2025-09-13T01:12:07.270025802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.271242 env[1249]: time="2025-09-13T01:12:07.271229299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:07.288556 env[1249]: time="2025-09-13T01:12:07.278387489Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:12:07.288556 env[1249]: time="2025-09-13T01:12:07.278408595Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:12:07.288556 env[1249]: time="2025-09-13T01:12:07.278415163Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:12:07.288556 env[1249]: time="2025-09-13T01:12:07.278489812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aea5d024be8361400f7fb9a8f35b3c9ca86e5ba75c5dc8c40520375059d9afb8 pid=1670 runtime=io.containerd.runc.v2 Sep 13 01:12:07.288733 env[1249]: time="2025-09-13T01:12:07.279071376Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:12:07.288733 env[1249]: time="2025-09-13T01:12:07.279089533Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:12:07.288733 env[1249]: time="2025-09-13T01:12:07.279096284Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:12:07.288733 env[1249]: time="2025-09-13T01:12:07.279228397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128 pid=1668 runtime=io.containerd.runc.v2 Sep 13 01:12:07.297260 systemd[1]: Started cri-containerd-7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128.scope. Sep 13 01:12:07.299486 systemd[1]: Started cri-containerd-aea5d024be8361400f7fb9a8f35b3c9ca86e5ba75c5dc8c40520375059d9afb8.scope. Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit: BPF prog-id=55 op=LOAD Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1670 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613564303234626538333631343030663766623961386633356233 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1670 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613564303234626538333631343030663766623961386633356233 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit: BPF prog-id=56 op=LOAD Sep 13 01:12:07.312000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032bd10 items=0 ppid=1670 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613564303234626538333631343030663766623961386633356233 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit: BPF prog-id=57 op=LOAD Sep 13 01:12:07.312000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032bd58 items=0 ppid=1670 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613564303234626538333631343030663766623961386633356233 Sep 13 01:12:07.312000 audit: BPF prog-id=57 op=UNLOAD Sep 13 01:12:07.312000 audit: BPF prog-id=56 op=UNLOAD Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.312000 audit: BPF prog-id=58 op=LOAD Sep 13 01:12:07.312000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037c168 items=0 ppid=1670 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613564303234626538333631343030663766623961386633356233 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit: BPF prog-id=59 op=LOAD Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1668 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762623538346533373531666430366437623130616133646531306537 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1668 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762623538346533373531666430366437623130616133646531306537 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit: BPF prog-id=60 op=LOAD Sep 13 01:12:07.315000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001bf240 items=0 ppid=1668 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762623538346533373531666430366437623130616133646531306537 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit: BPF prog-id=61 op=LOAD Sep 13 01:12:07.315000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001bf288 items=0 ppid=1668 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762623538346533373531666430366437623130616133646531306537 Sep 13 01:12:07.315000 audit: BPF prog-id=61 op=UNLOAD Sep 13 01:12:07.315000 audit: BPF prog-id=60 op=UNLOAD Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:07.315000 audit: BPF prog-id=62 op=LOAD Sep 13 01:12:07.315000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001bf698 items=0 ppid=1668 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:07.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762623538346533373531666430366437623130616133646531306537 Sep 13 01:12:07.325028 env[1249]: time="2025-09-13T01:12:07.324995364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wnpn4,Uid:1df86ad7-c474-46e6-9c1d-feb438a896e9,Namespace:calico-system,Attempt:0,} returns sandbox id \"7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128\"" Sep 13 01:12:07.326246 env[1249]: time="2025-09-13T01:12:07.326224894Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 01:12:07.329833 env[1249]: time="2025-09-13T01:12:07.329323669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d85vc,Uid:c2a0985e-6999-4f98-86ad-4bcdfb070437,Namespace:kube-system,Attempt:0,} returns sandbox id \"aea5d024be8361400f7fb9a8f35b3c9ca86e5ba75c5dc8c40520375059d9afb8\"" Sep 13 01:12:07.404358 kubelet[1601]: E0913 01:12:07.404289 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:07.538079 kubelet[1601]: E0913 01:12:07.536163 1601 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l9fgx" podUID="e406acba-8d5c-4e8a-9e2a-233a32847dff" Sep 13 01:12:07.559310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2949082637.mount: Deactivated successfully. Sep 13 01:12:08.405286 kubelet[1601]: E0913 01:12:08.405244 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:08.764785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2123424035.mount: Deactivated successfully. Sep 13 01:12:08.841037 env[1249]: time="2025-09-13T01:12:08.841007059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:08.841912 env[1249]: time="2025-09-13T01:12:08.841899649Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:08.842757 env[1249]: time="2025-09-13T01:12:08.842744514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:08.843693 env[1249]: time="2025-09-13T01:12:08.843680407Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:08.844074 env[1249]: time="2025-09-13T01:12:08.844058546Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 01:12:08.845039 env[1249]: time="2025-09-13T01:12:08.845025341Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\"" Sep 13 01:12:08.845655 env[1249]: time="2025-09-13T01:12:08.845635923Z" level=info msg="CreateContainer within sandbox \"7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 01:12:08.852104 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount288588483.mount: Deactivated successfully. Sep 13 01:12:08.856603 env[1249]: time="2025-09-13T01:12:08.856578483Z" level=info msg="CreateContainer within sandbox \"7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa\"" Sep 13 01:12:08.856944 env[1249]: time="2025-09-13T01:12:08.856928793Z" level=info msg="StartContainer for \"6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa\"" Sep 13 01:12:08.869185 systemd[1]: Started cri-containerd-6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa.scope. Sep 13 01:12:08.886294 kernel: kauditd_printk_skb: 357 callbacks suppressed Sep 13 01:12:08.886390 kernel: audit: type=1400 audit(1757725928.878:455): avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886425 kernel: audit: type=1300 audit(1757725928.878:455): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f24642802c8 items=0 ppid=1668 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f24642802c8 items=0 ppid=1668 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:08.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343237383465313064323166326234353937653765613137663130 Sep 13 01:12:08.891317 kernel: audit: type=1327 audit(1757725928.878:455): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343237383465313064323166326234353937653765613137663130 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.894124 kernel: audit: type=1400 audit(1757725928.878:456): avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.899843 kernel: audit: type=1400 audit(1757725928.878:456): avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.899921 kernel: audit: type=1400 audit(1757725928.878:456): avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.906148 kernel: audit: type=1400 audit(1757725928.878:456): avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.906199 kernel: audit: type=1400 audit(1757725928.878:456): avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.908824 kernel: audit: type=1400 audit(1757725928.878:456): avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.908878 kernel: audit: type=1400 audit(1757725928.878:456): avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.909374 systemd[1]: cri-containerd-6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa.scope: Deactivated successfully. Sep 13 01:12:08.910648 env[1249]: time="2025-09-13T01:12:08.910629752Z" level=info msg="StartContainer for \"6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa\" returns successfully" Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.878000 audit: BPF prog-id=63 op=LOAD Sep 13 01:12:08.878000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=1668 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:08.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343237383465313064323166326234353937653765613137663130 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.882000 audit: BPF prog-id=64 op=LOAD Sep 13 01:12:08.882000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=1668 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:08.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343237383465313064323166326234353937653765613137663130 Sep 13 01:12:08.886000 audit: BPF prog-id=64 op=UNLOAD Sep 13 01:12:08.886000 audit: BPF prog-id=63 op=UNLOAD Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:08.886000 audit: BPF prog-id=65 op=LOAD Sep 13 01:12:08.886000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=1668 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:08.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343237383465313064323166326234353937653765613137663130 Sep 13 01:12:08.913000 audit: BPF prog-id=65 op=UNLOAD Sep 13 01:12:08.979620 env[1249]: time="2025-09-13T01:12:08.979585467Z" level=info msg="shim disconnected" id=6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa Sep 13 01:12:08.979782 env[1249]: time="2025-09-13T01:12:08.979764021Z" level=warning msg="cleaning up after shim disconnected" id=6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa namespace=k8s.io Sep 13 01:12:08.979851 env[1249]: time="2025-09-13T01:12:08.979838097Z" level=info msg="cleaning up dead shim" Sep 13 01:12:08.985601 env[1249]: time="2025-09-13T01:12:08.985578944Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:12:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1789 runtime=io.containerd.runc.v2\n" Sep 13 01:12:09.406372 kubelet[1601]: E0913 01:12:09.406342 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:09.536282 kubelet[1601]: E0913 01:12:09.536067 1601 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l9fgx" podUID="e406acba-8d5c-4e8a-9e2a-233a32847dff" Sep 13 01:12:09.733323 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6242784e10d21f2b4597e7ea17f10a51ab91703fe028172c229fbdd15205d2aa-rootfs.mount: Deactivated successfully. Sep 13 01:12:09.914852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount933240974.mount: Deactivated successfully. Sep 13 01:12:10.347100 env[1249]: time="2025-09-13T01:12:10.347073763Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:10.348414 env[1249]: time="2025-09-13T01:12:10.348395666Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:10.348664 env[1249]: time="2025-09-13T01:12:10.348649211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:10.348969 env[1249]: time="2025-09-13T01:12:10.348955557Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:10.349255 env[1249]: time="2025-09-13T01:12:10.349240811Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.13\" returns image reference \"sha256:21d97a49eeb0b08ecaba421a84a79ca44cf2bc57773c085bbfda537488790ad7\"" Sep 13 01:12:10.350027 env[1249]: time="2025-09-13T01:12:10.350015115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 01:12:10.350794 env[1249]: time="2025-09-13T01:12:10.350744596Z" level=info msg="CreateContainer within sandbox \"aea5d024be8361400f7fb9a8f35b3c9ca86e5ba75c5dc8c40520375059d9afb8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 01:12:10.355821 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount799168725.mount: Deactivated successfully. Sep 13 01:12:10.363017 env[1249]: time="2025-09-13T01:12:10.362992227Z" level=info msg="CreateContainer within sandbox \"aea5d024be8361400f7fb9a8f35b3c9ca86e5ba75c5dc8c40520375059d9afb8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"08aa5c370d87611ace2978640b3ea06df9714aabdc9cb3daa824182b9c834eba\"" Sep 13 01:12:10.363381 env[1249]: time="2025-09-13T01:12:10.363355700Z" level=info msg="StartContainer for \"08aa5c370d87611ace2978640b3ea06df9714aabdc9cb3daa824182b9c834eba\"" Sep 13 01:12:10.372977 systemd[1]: Started cri-containerd-08aa5c370d87611ace2978640b3ea06df9714aabdc9cb3daa824182b9c834eba.scope. Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7febc2b19a28 items=0 ppid=1670 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038616135633337306438373631316163653239373836343062336561 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit: BPF prog-id=66 op=LOAD Sep 13 01:12:10.386000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a6b58 items=0 ppid=1670 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038616135633337306438373631316163653239373836343062336561 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit: BPF prog-id=67 op=LOAD Sep 13 01:12:10.386000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a6ba8 items=0 ppid=1670 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038616135633337306438373631316163653239373836343062336561 Sep 13 01:12:10.386000 audit: BPF prog-id=67 op=UNLOAD Sep 13 01:12:10.386000 audit: BPF prog-id=66 op=UNLOAD Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:10.386000 audit: BPF prog-id=68 op=LOAD Sep 13 01:12:10.386000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a6c38 items=0 ppid=1670 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038616135633337306438373631316163653239373836343062336561 Sep 13 01:12:10.397601 env[1249]: time="2025-09-13T01:12:10.397563809Z" level=info msg="StartContainer for \"08aa5c370d87611ace2978640b3ea06df9714aabdc9cb3daa824182b9c834eba\" returns successfully" Sep 13 01:12:10.406631 kubelet[1601]: E0913 01:12:10.406603 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:10.523000 audit[1873]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.523000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef1ee4030 a2=0 a3=7ffef1ee401c items=0 ppid=1824 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:12:10.524000 audit[1874]: NETFILTER_CFG table=nat:15 family=10 entries=1 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.524000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec5770750 a2=0 a3=7ffec577073c items=0 ppid=1824 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:12:10.524000 audit[1875]: NETFILTER_CFG table=mangle:16 family=2 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.524000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0c328cf0 a2=0 a3=7ffc0c328cdc items=0 ppid=1824 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:12:10.525000 audit[1876]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.525000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff94f0b990 a2=0 a3=7fff94f0b97c items=0 ppid=1824 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:12:10.525000 audit[1877]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.525000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff85fbbea0 a2=0 a3=7fff85fbbe8c items=0 ppid=1824 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.525000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:12:10.525000 audit[1878]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.525000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7929bf50 a2=0 a3=7ffc7929bf3c items=0 ppid=1824 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.525000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:12:10.625000 audit[1879]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.625000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd0153ca0 a2=0 a3=7ffdd0153c8c items=0 ppid=1824 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:12:10.627000 audit[1881]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.627000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe7ae7f210 a2=0 a3=7ffe7ae7f1fc items=0 ppid=1824 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 01:12:10.629000 audit[1884]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.629000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd35da94f0 a2=0 a3=7ffd35da94dc items=0 ppid=1824 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 01:12:10.630000 audit[1885]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.630000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd74f12030 a2=0 a3=7ffd74f1201c items=0 ppid=1824 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:12:10.632000 audit[1887]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.632000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1e3d7190 a2=0 a3=7ffd1e3d717c items=0 ppid=1824 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:12:10.633000 audit[1888]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.633000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc230ebd0 a2=0 a3=7fffc230ebbc items=0 ppid=1824 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:12:10.634000 audit[1890]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.634000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffecfbf7a70 a2=0 a3=7ffecfbf7a5c items=0 ppid=1824 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:12:10.636000 audit[1893]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.636000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4ab60320 a2=0 a3=7ffd4ab6030c items=0 ppid=1824 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 01:12:10.637000 audit[1894]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.637000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3321a6c0 a2=0 a3=7ffe3321a6ac items=0 ppid=1824 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:12:10.638000 audit[1896]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.638000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3c3dad50 a2=0 a3=7ffe3c3dad3c items=0 ppid=1824 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:12:10.639000 audit[1897]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.639000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7d0c0ff0 a2=0 a3=7ffd7d0c0fdc items=0 ppid=1824 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:12:10.641000 audit[1899]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.641000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0c280ba0 a2=0 a3=7fff0c280b8c items=0 ppid=1824 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:12:10.643000 audit[1902]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.643000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4e0fc4d0 a2=0 a3=7ffc4e0fc4bc items=0 ppid=1824 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:12:10.645000 audit[1905]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.645000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0db0acd0 a2=0 a3=7ffd0db0acbc items=0 ppid=1824 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:12:10.646000 audit[1906]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.646000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffebd6bf5f0 a2=0 a3=7ffebd6bf5dc items=0 ppid=1824 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:12:10.647000 audit[1908]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.647000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeafa3d3c0 a2=0 a3=7ffeafa3d3ac items=0 ppid=1824 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:12:10.666000 audit[1912]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.666000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc0265f3f0 a2=0 a3=7ffc0265f3dc items=0 ppid=1824 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:12:10.667000 audit[1913]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.667000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc11f4ed90 a2=0 a3=7ffc11f4ed7c items=0 ppid=1824 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:12:10.669000 audit[1915]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:12:10.669000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc2095d090 a2=0 a3=7ffc2095d07c items=0 ppid=1824 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:12:10.687000 audit[1921]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:12:10.687000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc1ab818b0 a2=0 a3=7ffc1ab8189c items=0 ppid=1824 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:10.709000 audit[1921]: NETFILTER_CFG table=nat:40 family=2 entries=68 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:12:10.709000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=32628 a0=3 a1=7ffc1ab818b0 a2=0 a3=7ffc1ab8189c items=0 ppid=1824 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:10.720000 audit[1931]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.720000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb7918460 a2=0 a3=7fffb791844c items=0 ppid=1824 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:12:10.722000 audit[1933]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.722000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd511fb990 a2=0 a3=7ffd511fb97c items=0 ppid=1824 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 01:12:10.724000 audit[1936]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.724000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb8475db0 a2=0 a3=7ffeb8475d9c items=0 ppid=1824 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 01:12:10.725000 audit[1937]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.725000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe17883d0 a2=0 a3=7fffe17883bc items=0 ppid=1824 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:12:10.726000 audit[1939]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.726000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb9322010 a2=0 a3=7ffeb9321ffc items=0 ppid=1824 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:12:10.727000 audit[1940]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.727000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed60ab900 a2=0 a3=7ffed60ab8ec items=0 ppid=1824 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:12:10.729000 audit[1942]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.729000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee907d420 a2=0 a3=7ffee907d40c items=0 ppid=1824 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 01:12:10.733325 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3908092283.mount: Deactivated successfully. Sep 13 01:12:10.733000 audit[1945]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.733000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcee332080 a2=0 a3=7ffcee33206c items=0 ppid=1824 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:12:10.734000 audit[1946]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.734000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc57108000 a2=0 a3=7ffc57107fec items=0 ppid=1824 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:12:10.735000 audit[1948]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.735000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed1a45ed0 a2=0 a3=7ffed1a45ebc items=0 ppid=1824 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:12:10.736000 audit[1949]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.736000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc97504710 a2=0 a3=7ffc975046fc items=0 ppid=1824 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:12:10.737000 audit[1951]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.737000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd915a0a00 a2=0 a3=7ffd915a09ec items=0 ppid=1824 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:12:10.739000 audit[1954]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.739000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfb7632a0 a2=0 a3=7ffdfb76328c items=0 ppid=1824 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:12:10.741000 audit[1957]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.741000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce53ed500 a2=0 a3=7ffce53ed4ec items=0 ppid=1824 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 01:12:10.742000 audit[1958]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.742000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2fd5f390 a2=0 a3=7ffd2fd5f37c items=0 ppid=1824 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:12:10.743000 audit[1960]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.743000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc584a5760 a2=0 a3=7ffc584a574c items=0 ppid=1824 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:12:10.745000 audit[1963]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.745000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffca6c7bcb0 a2=0 a3=7ffca6c7bc9c items=0 ppid=1824 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:12:10.746000 audit[1964]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.746000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe527e42b0 a2=0 a3=7ffe527e429c items=0 ppid=1824 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:12:10.747000 audit[1966]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.747000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd08da1270 a2=0 a3=7ffd08da125c items=0 ppid=1824 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:12:10.748000 audit[1967]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.748000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa4c85550 a2=0 a3=7fffa4c8553c items=0 ppid=1824 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:12:10.749000 audit[1969]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.749000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf32c1d80 a2=0 a3=7ffcf32c1d6c items=0 ppid=1824 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:12:10.751000 audit[1972]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:12:10.751000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc920b4e0 a2=0 a3=7ffcc920b4cc items=0 ppid=1824 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:12:10.753000 audit[1974]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:12:10.753000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff018f7650 a2=0 a3=7fff018f763c items=0 ppid=1824 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.753000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:10.753000 audit[1974]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:12:10.753000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff018f7650 a2=0 a3=7fff018f763c items=0 ppid=1824 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:10.753000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:11.406711 kubelet[1601]: E0913 01:12:11.406673 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:11.536405 kubelet[1601]: E0913 01:12:11.536187 1601 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l9fgx" podUID="e406acba-8d5c-4e8a-9e2a-233a32847dff" Sep 13 01:12:12.407688 kubelet[1601]: E0913 01:12:12.407645 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:13.057024 env[1249]: time="2025-09-13T01:12:13.056955779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:13.058147 env[1249]: time="2025-09-13T01:12:13.058134135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:13.059145 env[1249]: time="2025-09-13T01:12:13.059133064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:13.060107 env[1249]: time="2025-09-13T01:12:13.060094891Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:13.060485 env[1249]: time="2025-09-13T01:12:13.060471583Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 01:12:13.065513 env[1249]: time="2025-09-13T01:12:13.065492830Z" level=info msg="CreateContainer within sandbox \"7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 01:12:13.071396 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount606470125.mount: Deactivated successfully. Sep 13 01:12:13.086415 env[1249]: time="2025-09-13T01:12:13.086383503Z" level=info msg="CreateContainer within sandbox \"7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246\"" Sep 13 01:12:13.086756 env[1249]: time="2025-09-13T01:12:13.086732255Z" level=info msg="StartContainer for \"1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246\"" Sep 13 01:12:13.103147 systemd[1]: Started cri-containerd-1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246.scope. Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019d6b0 a2=3c a3=7fcb621598d8 items=0 ppid=1668 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:13.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363766393433626232613739396336646136633631653762326633 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit: BPF prog-id=69 op=LOAD Sep 13 01:12:13.112000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019d9d8 a2=78 a3=c0003b2258 items=0 ppid=1668 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:13.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363766393433626232613739396336646136633631653762326633 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit: BPF prog-id=70 op=LOAD Sep 13 01:12:13.112000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019d770 a2=78 a3=c0003b22a8 items=0 ppid=1668 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:13.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363766393433626232613739396336646136633631653762326633 Sep 13 01:12:13.112000 audit: BPF prog-id=70 op=UNLOAD Sep 13 01:12:13.112000 audit: BPF prog-id=69 op=UNLOAD Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:13.112000 audit: BPF prog-id=71 op=LOAD Sep 13 01:12:13.112000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019dc30 a2=78 a3=c0003b2338 items=0 ppid=1668 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:13.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165363766393433626232613739396336646136633631653762326633 Sep 13 01:12:13.122158 env[1249]: time="2025-09-13T01:12:13.122129041Z" level=info msg="StartContainer for \"1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246\" returns successfully" Sep 13 01:12:13.408628 kubelet[1601]: E0913 01:12:13.408559 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:13.536470 kubelet[1601]: E0913 01:12:13.536430 1601 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l9fgx" podUID="e406acba-8d5c-4e8a-9e2a-233a32847dff" Sep 13 01:12:13.867551 kubelet[1601]: I0913 01:12:13.867507 1601 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-d85vc" podStartSLOduration=5.847802988 podStartE2EDuration="8.867483108s" podCreationTimestamp="2025-09-13 01:12:05 +0000 UTC" firstStartedPulling="2025-09-13 01:12:07.330258842 +0000 UTC m=+3.278055817" lastFinishedPulling="2025-09-13 01:12:10.349938966 +0000 UTC m=+6.297735937" observedRunningTime="2025-09-13 01:12:10.657969722 +0000 UTC m=+6.605766705" watchObservedRunningTime="2025-09-13 01:12:13.867483108 +0000 UTC m=+9.815280092" Sep 13 01:12:14.070272 systemd[1]: run-containerd-runc-k8s.io-1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246-runc.VfM5i7.mount: Deactivated successfully. Sep 13 01:12:14.177412 env[1249]: time="2025-09-13T01:12:14.177223540Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:12:14.178773 systemd[1]: cri-containerd-1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246.scope: Deactivated successfully. Sep 13 01:12:14.186842 kernel: kauditd_printk_skb: 273 callbacks suppressed Sep 13 01:12:14.186909 kernel: audit: type=1334 audit(1757725934.184:525): prog-id=71 op=UNLOAD Sep 13 01:12:14.184000 audit: BPF prog-id=71 op=UNLOAD Sep 13 01:12:14.191498 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246-rootfs.mount: Deactivated successfully. Sep 13 01:12:14.266602 kubelet[1601]: I0913 01:12:14.266144 1601 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 13 01:12:14.408863 kubelet[1601]: E0913 01:12:14.408833 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:14.728742 env[1249]: time="2025-09-13T01:12:14.728707252Z" level=info msg="shim disconnected" id=1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246 Sep 13 01:12:14.728928 env[1249]: time="2025-09-13T01:12:14.728913146Z" level=warning msg="cleaning up after shim disconnected" id=1e67f943bb2a799c6da6c61e7b2f3bbe9b785e5c6af35b875b065d304e466246 namespace=k8s.io Sep 13 01:12:14.729019 env[1249]: time="2025-09-13T01:12:14.729006384Z" level=info msg="cleaning up dead shim" Sep 13 01:12:14.734703 env[1249]: time="2025-09-13T01:12:14.734682643Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:12:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2022 runtime=io.containerd.runc.v2\n" Sep 13 01:12:15.409816 kubelet[1601]: E0913 01:12:15.409788 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:15.538828 systemd[1]: Created slice kubepods-besteffort-pode406acba_8d5c_4e8a_9e2a_233a32847dff.slice. Sep 13 01:12:15.540259 env[1249]: time="2025-09-13T01:12:15.540236879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l9fgx,Uid:e406acba-8d5c-4e8a-9e2a-233a32847dff,Namespace:calico-system,Attempt:0,}" Sep 13 01:12:15.554164 env[1249]: time="2025-09-13T01:12:15.554138924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 01:12:15.580291 env[1249]: time="2025-09-13T01:12:15.580239782Z" level=error msg="Failed to destroy network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:12:15.582227 env[1249]: time="2025-09-13T01:12:15.581617011Z" level=error msg="encountered an error cleaning up failed sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:12:15.582227 env[1249]: time="2025-09-13T01:12:15.581826432Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l9fgx,Uid:e406acba-8d5c-4e8a-9e2a-233a32847dff,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:12:15.581241 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb-shm.mount: Deactivated successfully. Sep 13 01:12:15.582335 kubelet[1601]: E0913 01:12:15.582239 1601 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:12:15.582335 kubelet[1601]: E0913 01:12:15.582272 1601 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l9fgx" Sep 13 01:12:15.582335 kubelet[1601]: E0913 01:12:15.582286 1601 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l9fgx" Sep 13 01:12:15.582405 kubelet[1601]: E0913 01:12:15.582310 1601 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-l9fgx_calico-system(e406acba-8d5c-4e8a-9e2a-233a32847dff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-l9fgx_calico-system(e406acba-8d5c-4e8a-9e2a-233a32847dff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l9fgx" podUID="e406acba-8d5c-4e8a-9e2a-233a32847dff" Sep 13 01:12:16.410636 kubelet[1601]: E0913 01:12:16.410603 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:16.554698 kubelet[1601]: I0913 01:12:16.554361 1601 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:12:16.554898 env[1249]: time="2025-09-13T01:12:16.554878864Z" level=info msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\"" Sep 13 01:12:16.569590 env[1249]: time="2025-09-13T01:12:16.569557382Z" level=error msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" failed" error="failed to destroy network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:12:16.569949 kubelet[1601]: E0913 01:12:16.569807 1601 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:12:16.569949 kubelet[1601]: E0913 01:12:16.569855 1601 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb"} Sep 13 01:12:16.569949 kubelet[1601]: E0913 01:12:16.569893 1601 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e406acba-8d5c-4e8a-9e2a-233a32847dff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 01:12:16.569949 kubelet[1601]: E0913 01:12:16.569919 1601 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e406acba-8d5c-4e8a-9e2a-233a32847dff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l9fgx" podUID="e406acba-8d5c-4e8a-9e2a-233a32847dff" Sep 13 01:12:17.411671 kubelet[1601]: E0913 01:12:17.411633 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:17.429139 update_engine[1243]: I0913 01:12:17.428889 1243 update_attempter.cc:509] Updating boot flags... Sep 13 01:12:18.412218 kubelet[1601]: E0913 01:12:18.412188 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:19.412505 kubelet[1601]: E0913 01:12:19.412480 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:20.074748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2187980177.mount: Deactivated successfully. Sep 13 01:12:20.095875 env[1249]: time="2025-09-13T01:12:20.095849491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:20.097558 env[1249]: time="2025-09-13T01:12:20.097544883Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:20.098496 env[1249]: time="2025-09-13T01:12:20.098483437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:20.099867 env[1249]: time="2025-09-13T01:12:20.099854256Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:20.100156 env[1249]: time="2025-09-13T01:12:20.100142519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 01:12:20.108787 env[1249]: time="2025-09-13T01:12:20.108765823Z" level=info msg="CreateContainer within sandbox \"7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 01:12:20.115721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3099493673.mount: Deactivated successfully. Sep 13 01:12:20.117262 env[1249]: time="2025-09-13T01:12:20.117240569Z" level=info msg="CreateContainer within sandbox \"7bb584e3751fd06d7b10aa3de10e791abcbf091a26670478e49f4b5992315128\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f\"" Sep 13 01:12:20.117727 env[1249]: time="2025-09-13T01:12:20.117706670Z" level=info msg="StartContainer for \"d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f\"" Sep 13 01:12:20.128984 systemd[1]: Started cri-containerd-d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f.scope. Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f93e00267b8 items=0 ppid=1668 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:20.146983 kernel: audit: type=1400 audit(1757725940.139:526): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.147033 kernel: audit: type=1300 audit(1757725940.139:526): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f93e00267b8 items=0 ppid=1668 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:20.147051 kernel: audit: type=1327 audit(1757725940.139:526): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383130623838313164343539643764333034333361396164383139 Sep 13 01:12:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383130623838313164343539643764333034333361396164383139 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.152915 kernel: audit: type=1400 audit(1757725940.139:527): avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.152950 kernel: audit: type=1400 audit(1757725940.139:527): avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.157662 kernel: audit: type=1400 audit(1757725940.139:527): avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.162730 kernel: audit: type=1400 audit(1757725940.139:527): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.162776 kernel: audit: type=1400 audit(1757725940.139:527): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.162792 kernel: audit: type=1400 audit(1757725940.139:527): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.167867 kernel: audit: type=1400 audit(1757725940.139:527): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.139000 audit: BPF prog-id=72 op=LOAD Sep 13 01:12:20.139000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002a2888 items=0 ppid=1668 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:20.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383130623838313164343539643764333034333361396164383139 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.146000 audit: BPF prog-id=73 op=LOAD Sep 13 01:12:20.146000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002a28d8 items=0 ppid=1668 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:20.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383130623838313164343539643764333034333361396164383139 Sep 13 01:12:20.149000 audit: BPF prog-id=73 op=UNLOAD Sep 13 01:12:20.149000 audit: BPF prog-id=72 op=UNLOAD Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:20.149000 audit: BPF prog-id=74 op=LOAD Sep 13 01:12:20.149000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002a2968 items=0 ppid=1668 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:20.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432383130623838313164343539643764333034333361396164383139 Sep 13 01:12:20.177580 env[1249]: time="2025-09-13T01:12:20.177556620Z" level=info msg="StartContainer for \"d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f\" returns successfully" Sep 13 01:12:20.239904 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 01:12:20.239989 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 01:12:20.412662 kubelet[1601]: E0913 01:12:20.412584 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:21.051314 kubelet[1601]: I0913 01:12:21.051262 1601 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wnpn4" podStartSLOduration=3.276334602 podStartE2EDuration="16.051241399s" podCreationTimestamp="2025-09-13 01:12:05 +0000 UTC" firstStartedPulling="2025-09-13 01:12:07.325980302 +0000 UTC m=+3.273777276" lastFinishedPulling="2025-09-13 01:12:20.100887097 +0000 UTC m=+16.048684073" observedRunningTime="2025-09-13 01:12:21.016784843 +0000 UTC m=+16.964581818" watchObservedRunningTime="2025-09-13 01:12:21.051241399 +0000 UTC m=+16.999038376" Sep 13 01:12:21.413575 kubelet[1601]: E0913 01:12:21.413503 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:21.573284 systemd[1]: run-containerd-runc-k8s.io-d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f-runc.VVipJE.mount: Deactivated successfully. Sep 13 01:12:21.911000 audit[2224]: AVC avc: denied { write } for pid=2224 comm="tee" name="fd" dev="proc" ino=28634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:12:21.911000 audit[2224]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9f0ac7e6 a2=241 a3=1b6 items=1 ppid=2200 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:21.911000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 01:12:21.911000 audit: PATH item=0 name="/dev/fd/63" inode=29958 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:12:21.911000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:12:21.921000 audit[2230]: AVC avc: denied { write } for pid=2230 comm="tee" name="fd" dev="proc" ino=28645 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:12:21.921000 audit[2230]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda9ca47d5 a2=241 a3=1b6 items=1 ppid=2206 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:21.921000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 01:12:21.921000 audit: PATH item=0 name="/dev/fd/63" inode=29961 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:12:21.921000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:12:21.928000 audit[2253]: AVC avc: denied { write } for pid=2253 comm="tee" name="fd" dev="proc" ino=28650 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:12:21.928000 audit[2253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbcf557e5 a2=241 a3=1b6 items=1 ppid=2214 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:21.928000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 01:12:21.928000 audit: PATH item=0 name="/dev/fd/63" inode=28642 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:12:21.928000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:12:21.931000 audit[2260]: AVC avc: denied { write } for pid=2260 comm="tee" name="fd" dev="proc" ino=28654 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:12:21.931000 audit[2260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc62a3b7e5 a2=241 a3=1b6 items=1 ppid=2210 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:21.931000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 01:12:21.931000 audit: PATH item=0 name="/dev/fd/63" inode=28647 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:12:21.931000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:12:21.948000 audit[2257]: AVC avc: denied { write } for pid=2257 comm="tee" name="fd" dev="proc" ino=28660 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:12:21.948000 audit[2257]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd57a437d6 a2=241 a3=1b6 items=1 ppid=2209 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:21.948000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 01:12:21.948000 audit: PATH item=0 name="/dev/fd/63" inode=29986 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:12:21.948000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:12:21.954000 audit[2269]: AVC avc: denied { write } for pid=2269 comm="tee" name="fd" dev="proc" ino=28664 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:12:21.954000 audit[2269]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc3d5f7e7 a2=241 a3=1b6 items=1 ppid=2208 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:21.954000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 01:12:21.954000 audit: PATH item=0 name="/dev/fd/63" inode=29994 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:12:21.955000 audit[2273]: AVC avc: denied { write } for pid=2273 comm="tee" name="fd" dev="proc" ino=28668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:12:21.955000 audit[2273]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef192d7e5 a2=241 a3=1b6 items=1 ppid=2204 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:21.955000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 01:12:21.955000 audit: PATH item=0 name="/dev/fd/63" inode=29996 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:12:21.954000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:12:21.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit: BPF prog-id=75 op=LOAD Sep 13 01:12:22.225000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8e019290 a2=98 a3=1fffffffffffffff items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.225000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:12:22.225000 audit: BPF prog-id=75 op=UNLOAD Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit: BPF prog-id=76 op=LOAD Sep 13 01:12:22.225000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8e019170 a2=94 a3=3 items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.225000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:12:22.225000 audit: BPF prog-id=76 op=UNLOAD Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit: BPF prog-id=77 op=LOAD Sep 13 01:12:22.225000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8e0191b0 a2=94 a3=7ffe8e019390 items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.225000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:12:22.225000 audit: BPF prog-id=77 op=UNLOAD Sep 13 01:12:22.225000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.225000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe8e019280 a2=50 a3=a000000085 items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.225000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit: BPF prog-id=78 op=LOAD Sep 13 01:12:22.227000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd50077860 a2=98 a3=3 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.227000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.227000 audit: BPF prog-id=78 op=UNLOAD Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit: BPF prog-id=79 op=LOAD Sep 13 01:12:22.227000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd50077650 a2=94 a3=54428f items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.227000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.227000 audit: BPF prog-id=79 op=UNLOAD Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.227000 audit: BPF prog-id=80 op=LOAD Sep 13 01:12:22.227000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd50077680 a2=94 a3=2 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.227000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.227000 audit: BPF prog-id=80 op=UNLOAD Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit: BPF prog-id=81 op=LOAD Sep 13 01:12:22.300000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd50077540 a2=94 a3=1 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.300000 audit: BPF prog-id=81 op=UNLOAD Sep 13 01:12:22.300000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.300000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd50077610 a2=50 a3=7ffd500776f0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd50077550 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd50077580 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd50077490 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd500775a0 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd50077580 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd50077570 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd500775a0 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd50077580 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd500775a0 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd50077570 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd500775e0 a2=28 a3=0 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd50077390 a2=50 a3=1 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit: BPF prog-id=82 op=LOAD Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd50077390 a2=94 a3=5 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit: BPF prog-id=82 op=UNLOAD Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd50077440 a2=50 a3=1 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd50077560 a2=4 a3=38 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.307000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:12:22.307000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd500775b0 a2=94 a3=6 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:12:22.308000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd50076d60 a2=94 a3=88 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.308000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:12:22.308000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd50076d60 a2=94 a3=88 items=0 ppid=2212 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.308000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit: BPF prog-id=83 op=LOAD Sep 13 01:12:22.314000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2f26eef0 a2=98 a3=1999999999999999 items=0 ppid=2212 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.314000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:12:22.314000 audit: BPF prog-id=83 op=UNLOAD Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit: BPF prog-id=84 op=LOAD Sep 13 01:12:22.314000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2f26edd0 a2=94 a3=ffff items=0 ppid=2212 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.314000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:12:22.314000 audit: BPF prog-id=84 op=UNLOAD Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.314000 audit: BPF prog-id=85 op=LOAD Sep 13 01:12:22.314000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2f26ee10 a2=94 a3=7ffc2f26eff0 items=0 ppid=2212 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.314000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:12:22.314000 audit: BPF prog-id=85 op=UNLOAD Sep 13 01:12:22.368184 systemd-networkd[1063]: vxlan.calico: Link UP Sep 13 01:12:22.368190 systemd-networkd[1063]: vxlan.calico: Gained carrier Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit: BPF prog-id=86 op=LOAD Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed3583be0 a2=98 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit: BPF prog-id=86 op=UNLOAD Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit: BPF prog-id=87 op=LOAD Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed35839f0 a2=94 a3=54428f items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit: BPF prog-id=87 op=UNLOAD Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit: BPF prog-id=88 op=LOAD Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed3583a20 a2=94 a3=2 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit: BPF prog-id=88 op=UNLOAD Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed35838f0 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed3583920 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed3583830 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed3583940 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed3583920 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed3583910 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed3583940 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed3583920 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed3583940 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed3583910 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed3583980 a2=28 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.408000 audit: BPF prog-id=89 op=LOAD Sep 13 01:12:22.408000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed35837f0 a2=94 a3=0 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.408000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.408000 audit: BPF prog-id=89 op=UNLOAD Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffed35837e0 a2=50 a3=2800 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffed35837e0 a2=50 a3=2800 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit: BPF prog-id=90 op=LOAD Sep 13 01:12:22.409000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed3583000 a2=94 a3=2 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.409000 audit: BPF prog-id=90 op=UNLOAD Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.409000 audit: BPF prog-id=91 op=LOAD Sep 13 01:12:22.409000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed3583100 a2=94 a3=30 items=0 ppid=2212 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.409000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.410000 audit: BPF prog-id=92 op=LOAD Sep 13 01:12:22.410000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc194911f0 a2=98 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.410000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.410000 audit: BPF prog-id=92 op=UNLOAD Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit: BPF prog-id=93 op=LOAD Sep 13 01:12:22.411000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc19490fe0 a2=94 a3=54428f items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.411000 audit: BPF prog-id=93 op=UNLOAD Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.411000 audit: BPF prog-id=94 op=LOAD Sep 13 01:12:22.411000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc19491010 a2=94 a3=2 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.411000 audit: BPF prog-id=94 op=UNLOAD Sep 13 01:12:22.414389 kubelet[1601]: E0913 01:12:22.414209 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.502000 audit: BPF prog-id=95 op=LOAD Sep 13 01:12:22.502000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc19490ed0 a2=94 a3=1 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.503000 audit: BPF prog-id=95 op=UNLOAD Sep 13 01:12:22.503000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.503000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc19490fa0 a2=50 a3=7ffc19491080 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19490ee0 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19490f10 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19490e20 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19490f30 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19490f10 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19490f00 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19490f30 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19490f10 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19490f30 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc19490f00 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc19490f70 a2=28 a3=0 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc19490d20 a2=50 a3=1 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit: BPF prog-id=96 op=LOAD Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc19490d20 a2=94 a3=5 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit: BPF prog-id=96 op=UNLOAD Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc19490dd0 a2=50 a3=1 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc19490ef0 a2=4 a3=38 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.510000 audit[2340]: AVC avc: denied { confidentiality } for pid=2340 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:12:22.510000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc19490f40 a2=94 a3=6 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { confidentiality } for pid=2340 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:12:22.511000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc194906f0 a2=94 a3=88 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { confidentiality } for pid=2340 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:12:22.511000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc194906f0 a2=94 a3=88 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19492120 a2=10 a3=f8f00800 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19491fc0 a2=10 a3=3 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19491f60 a2=10 a3=3 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.511000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:22.511000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc19491f60 a2=10 a3=7 items=0 ppid=2212 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:12:22.516000 audit: BPF prog-id=91 op=UNLOAD Sep 13 01:12:22.554000 audit[2368]: NETFILTER_CFG table=raw:65 family=2 entries=21 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:12:22.554000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff6b2df320 a2=0 a3=7fff6b2df30c items=0 ppid=2212 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.554000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:12:22.566000 audit[2373]: NETFILTER_CFG table=mangle:66 family=2 entries=16 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:12:22.566000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff0dc5da50 a2=0 a3=7fff0dc5da3c items=0 ppid=2212 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:12:22.568000 audit[2369]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:12:22.568000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffca5dc36c0 a2=0 a3=7ffca5dc36ac items=0 ppid=2212 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.568000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:12:22.570000 audit[2372]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:12:22.570000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff75ecf460 a2=0 a3=7fff75ecf44c items=0 ppid=2212 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:22.570000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:12:23.414692 kubelet[1601]: E0913 01:12:23.414657 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:24.375277 systemd-networkd[1063]: vxlan.calico: Gained IPv6LL Sep 13 01:12:24.394928 kubelet[1601]: E0913 01:12:24.394895 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:24.415512 kubelet[1601]: E0913 01:12:24.415475 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:25.416222 kubelet[1601]: E0913 01:12:25.416198 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:26.416785 kubelet[1601]: E0913 01:12:26.416756 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:27.417413 kubelet[1601]: E0913 01:12:27.417389 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:28.418286 kubelet[1601]: E0913 01:12:28.418257 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:28.536778 env[1249]: time="2025-09-13T01:12:28.536747428Z" level=info msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\"" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.686 [INFO][2400] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.687 [INFO][2400] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" iface="eth0" netns="/var/run/netns/cni-2fa9f883-8a90-00be-80f9-f88d248f9d1a" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.690 [INFO][2400] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" iface="eth0" netns="/var/run/netns/cni-2fa9f883-8a90-00be-80f9-f88d248f9d1a" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.691 [INFO][2400] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" iface="eth0" netns="/var/run/netns/cni-2fa9f883-8a90-00be-80f9-f88d248f9d1a" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.691 [INFO][2400] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.691 [INFO][2400] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.922 [INFO][2407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.922 [INFO][2407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.923 [INFO][2407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.930 [WARNING][2407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.930 [INFO][2407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.932 [INFO][2407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:12:28.934056 env[1249]: 2025-09-13 01:12:28.933 [INFO][2400] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:12:28.935908 env[1249]: time="2025-09-13T01:12:28.935200510Z" level=info msg="TearDown network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" successfully" Sep 13 01:12:28.935908 env[1249]: time="2025-09-13T01:12:28.935222958Z" level=info msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" returns successfully" Sep 13 01:12:28.935187 systemd[1]: run-netns-cni\x2d2fa9f883\x2d8a90\x2d00be\x2d80f9\x2df88d248f9d1a.mount: Deactivated successfully. Sep 13 01:12:28.936316 env[1249]: time="2025-09-13T01:12:28.936303377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l9fgx,Uid:e406acba-8d5c-4e8a-9e2a-233a32847dff,Namespace:calico-system,Attempt:1,}" Sep 13 01:12:29.062693 systemd-networkd[1063]: cali68ceb6206bb: Link UP Sep 13 01:12:29.064987 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:12:29.065062 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali68ceb6206bb: link becomes ready Sep 13 01:12:29.065050 systemd-networkd[1063]: cali68ceb6206bb: Gained carrier Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:28.970 [INFO][2414] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.133-k8s-csi--node--driver--l9fgx-eth0 csi-node-driver- calico-system e406acba-8d5c-4e8a-9e2a-233a32847dff 1219 0 2025-09-13 01:12:05 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.133 csi-node-driver-l9fgx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali68ceb6206bb [] [] }} ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:28.970 [INFO][2414] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:28.989 [INFO][2426] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" HandleID="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:28.989 [INFO][2426] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" HandleID="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.133", "pod":"csi-node-driver-l9fgx", "timestamp":"2025-09-13 01:12:28.989244369 +0000 UTC"}, Hostname:"10.67.124.133", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:28.989 [INFO][2426] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:28.989 [INFO][2426] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:28.989 [INFO][2426] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.133' Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.021 [INFO][2426] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.034 [INFO][2426] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.040 [INFO][2426] ipam/ipam.go 511: Trying affinity for 192.168.66.64/26 host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.042 [INFO][2426] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.043 [INFO][2426] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.043 [INFO][2426] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.046 [INFO][2426] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.052 [INFO][2426] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.056 [INFO][2426] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.65/26] block=192.168.66.64/26 handle="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.056 [INFO][2426] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.65/26] handle="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" host="10.67.124.133" Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.056 [INFO][2426] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:12:29.078847 env[1249]: 2025-09-13 01:12:29.056 [INFO][2426] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.65/26] IPv6=[] ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" HandleID="k8s-pod-network.9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:29.079382 env[1249]: 2025-09-13 01:12:29.057 [INFO][2414] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-csi--node--driver--l9fgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e406acba-8d5c-4e8a-9e2a-233a32847dff", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 12, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"", Pod:"csi-node-driver-l9fgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali68ceb6206bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:12:29.079382 env[1249]: 2025-09-13 01:12:29.057 [INFO][2414] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.65/32] ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:29.079382 env[1249]: 2025-09-13 01:12:29.057 [INFO][2414] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali68ceb6206bb ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:29.079382 env[1249]: 2025-09-13 01:12:29.068 [INFO][2414] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:29.079382 env[1249]: 2025-09-13 01:12:29.069 [INFO][2414] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-csi--node--driver--l9fgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e406acba-8d5c-4e8a-9e2a-233a32847dff", ResourceVersion:"1219", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 12, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e", Pod:"csi-node-driver-l9fgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali68ceb6206bb", MAC:"2e:75:55:23:f9:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:12:29.079382 env[1249]: 2025-09-13 01:12:29.077 [INFO][2414] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e" Namespace="calico-system" Pod="csi-node-driver-l9fgx" WorkloadEndpoint="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:12:29.084442 env[1249]: time="2025-09-13T01:12:29.084388631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:12:29.084442 env[1249]: time="2025-09-13T01:12:29.084418263Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:12:29.084570 env[1249]: time="2025-09-13T01:12:29.084425340Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:12:29.084759 env[1249]: time="2025-09-13T01:12:29.084735690Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e pid=2448 runtime=io.containerd.runc.v2 Sep 13 01:12:29.096205 systemd[1]: Started cri-containerd-9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e.scope. Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.106192 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 13 01:12:29.106248 kernel: audit: type=1400 audit(1757725949.101:641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.106275 kernel: audit: type=1400 audit(1757725949.101:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.108547 kernel: audit: type=1400 audit(1757725949.101:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.113275 kernel: audit: type=1400 audit(1757725949.101:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.113300 kernel: audit: type=1400 audit(1757725949.101:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.118077 kernel: audit: type=1400 audit(1757725949.101:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.118143 kernel: audit: type=1400 audit(1757725949.101:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.122898 kernel: audit: type=1400 audit(1757725949.101:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.122949 kernel: audit: type=1400 audit(1757725949.101:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.129006 kernel: audit: type=1400 audit(1757725949.102:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit: BPF prog-id=97 op=LOAD Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:29.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353536363462666533613938643661313437643334353134663161 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:29.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353536363462666533613938643661313437643334353134663161 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.102000 audit: BPF prog-id=98 op=LOAD Sep 13 01:12:29.102000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002a0350 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:29.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353536363462666533613938643661313437643334353134663161 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.110000 audit: BPF prog-id=99 op=LOAD Sep 13 01:12:29.110000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002a0398 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:29.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353536363462666533613938643661313437643334353134663161 Sep 13 01:12:29.115000 audit: BPF prog-id=99 op=UNLOAD Sep 13 01:12:29.115000 audit: BPF prog-id=98 op=UNLOAD Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:29.115000 audit: BPF prog-id=100 op=LOAD Sep 13 01:12:29.115000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002a07a8 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:29.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353536363462666533613938643661313437643334353134663161 Sep 13 01:12:29.125936 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 01:12:29.139760 env[1249]: time="2025-09-13T01:12:29.139735913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l9fgx,Uid:e406acba-8d5c-4e8a-9e2a-233a32847dff,Namespace:calico-system,Attempt:1,} returns sandbox id \"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e\"" Sep 13 01:12:29.141012 env[1249]: time="2025-09-13T01:12:29.140977468Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 01:12:29.136000 audit[2475]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:12:29.136000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffc5b426120 a2=0 a3=7ffc5b42610c items=0 ppid=2212 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:29.136000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:12:29.419039 kubelet[1601]: E0913 01:12:29.418985 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:29.935280 systemd[1]: run-containerd-runc-k8s.io-9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e-runc.yaVQ22.mount: Deactivated successfully. Sep 13 01:12:30.419647 kubelet[1601]: E0913 01:12:30.419621 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:30.471935 env[1249]: time="2025-09-13T01:12:30.471901357Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:30.473218 env[1249]: time="2025-09-13T01:12:30.473204836Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:30.474481 env[1249]: time="2025-09-13T01:12:30.474103759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:30.474957 env[1249]: time="2025-09-13T01:12:30.474944726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:30.475327 env[1249]: time="2025-09-13T01:12:30.475312381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 01:12:30.477008 env[1249]: time="2025-09-13T01:12:30.476987796Z" level=info msg="CreateContainer within sandbox \"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 01:12:30.486828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount669660924.mount: Deactivated successfully. Sep 13 01:12:30.494973 env[1249]: time="2025-09-13T01:12:30.494950095Z" level=info msg="CreateContainer within sandbox \"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1ff99d65bcd19b563b54cf58b94289cf4bd1e8810924785336630229e859ca81\"" Sep 13 01:12:30.495412 env[1249]: time="2025-09-13T01:12:30.495398820Z" level=info msg="StartContainer for \"1ff99d65bcd19b563b54cf58b94289cf4bd1e8810924785336630229e859ca81\"" Sep 13 01:12:30.509104 systemd[1]: Started cri-containerd-1ff99d65bcd19b563b54cf58b94289cf4bd1e8810924785336630229e859ca81.scope. Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe6d30a2ee8 items=0 ppid=2448 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:30.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166663939643635626364313962353633623534636635386239343238 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.526000 audit: BPF prog-id=101 op=LOAD Sep 13 01:12:30.526000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000348088 items=0 ppid=2448 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:30.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166663939643635626364313962353633623534636635386239343238 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit: BPF prog-id=102 op=LOAD Sep 13 01:12:30.527000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003480d8 items=0 ppid=2448 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:30.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166663939643635626364313962353633623534636635386239343238 Sep 13 01:12:30.527000 audit: BPF prog-id=102 op=UNLOAD Sep 13 01:12:30.527000 audit: BPF prog-id=101 op=UNLOAD Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { perfmon } for pid=2494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit[2494]: AVC avc: denied { bpf } for pid=2494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:30.527000 audit: BPF prog-id=103 op=LOAD Sep 13 01:12:30.527000 audit[2494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000348168 items=0 ppid=2448 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:30.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166663939643635626364313962353633623534636635386239343238 Sep 13 01:12:30.542753 env[1249]: time="2025-09-13T01:12:30.542721480Z" level=info msg="StartContainer for \"1ff99d65bcd19b563b54cf58b94289cf4bd1e8810924785336630229e859ca81\" returns successfully" Sep 13 01:12:30.543764 env[1249]: time="2025-09-13T01:12:30.543750626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 01:12:30.839292 systemd-networkd[1063]: cali68ceb6206bb: Gained IPv6LL Sep 13 01:12:30.935291 systemd[1]: run-containerd-runc-k8s.io-1ff99d65bcd19b563b54cf58b94289cf4bd1e8810924785336630229e859ca81-runc.6wkI2a.mount: Deactivated successfully. Sep 13 01:12:31.420726 kubelet[1601]: E0913 01:12:31.420688 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:32.253974 env[1249]: time="2025-09-13T01:12:32.253941172Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:32.254827 env[1249]: time="2025-09-13T01:12:32.254810285Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:32.255660 env[1249]: time="2025-09-13T01:12:32.255644616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:32.256501 env[1249]: time="2025-09-13T01:12:32.256485742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:32.256745 env[1249]: time="2025-09-13T01:12:32.256726605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 01:12:32.258253 env[1249]: time="2025-09-13T01:12:32.258237397Z" level=info msg="CreateContainer within sandbox \"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 01:12:32.264436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount13849610.mount: Deactivated successfully. Sep 13 01:12:32.277773 env[1249]: time="2025-09-13T01:12:32.277747485Z" level=info msg="CreateContainer within sandbox \"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"955b66b9ee9152365255ab0df66fd5fc690a263d74cc9f8200b5067fa29c918d\"" Sep 13 01:12:32.278352 env[1249]: time="2025-09-13T01:12:32.278340433Z" level=info msg="StartContainer for \"955b66b9ee9152365255ab0df66fd5fc690a263d74cc9f8200b5067fa29c918d\"" Sep 13 01:12:32.294376 systemd[1]: Started cri-containerd-955b66b9ee9152365255ab0df66fd5fc690a263d74cc9f8200b5067fa29c918d.scope. Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fdc165c62f8 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:32.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935356236366239656539313532333635323535616230646636366664 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit: BPF prog-id=104 op=LOAD Sep 13 01:12:32.307000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000248c8 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:32.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935356236366239656539313532333635323535616230646636366664 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit: BPF prog-id=105 op=LOAD Sep 13 01:12:32.307000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024918 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:32.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935356236366239656539313532333635323535616230646636366664 Sep 13 01:12:32.307000 audit: BPF prog-id=105 op=UNLOAD Sep 13 01:12:32.307000 audit: BPF prog-id=104 op=UNLOAD Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:32.307000 audit: BPF prog-id=106 op=LOAD Sep 13 01:12:32.307000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000249a8 items=0 ppid=2448 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:32.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935356236366239656539313532333635323535616230646636366664 Sep 13 01:12:32.319761 env[1249]: time="2025-09-13T01:12:32.319735058Z" level=info msg="StartContainer for \"955b66b9ee9152365255ab0df66fd5fc690a263d74cc9f8200b5067fa29c918d\" returns successfully" Sep 13 01:12:32.421762 kubelet[1601]: E0913 01:12:32.421726 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:32.496272 kubelet[1601]: I0913 01:12:32.496051 1601 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 01:12:32.496272 kubelet[1601]: I0913 01:12:32.496079 1601 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 01:12:32.643835 kubelet[1601]: I0913 01:12:32.643728 1601 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-l9fgx" podStartSLOduration=24.526936171 podStartE2EDuration="27.643714367s" podCreationTimestamp="2025-09-13 01:12:05 +0000 UTC" firstStartedPulling="2025-09-13 01:12:29.140593095 +0000 UTC m=+25.088390066" lastFinishedPulling="2025-09-13 01:12:32.25737129 +0000 UTC m=+28.205168262" observedRunningTime="2025-09-13 01:12:32.63951968 +0000 UTC m=+28.587316663" watchObservedRunningTime="2025-09-13 01:12:32.643714367 +0000 UTC m=+28.591511351" Sep 13 01:12:33.262978 systemd[1]: run-containerd-runc-k8s.io-955b66b9ee9152365255ab0df66fd5fc690a263d74cc9f8200b5067fa29c918d-runc.EJqdSt.mount: Deactivated successfully. Sep 13 01:12:33.422102 kubelet[1601]: E0913 01:12:33.422077 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:34.132000 audit[2568]: NETFILTER_CFG table=filter:70 family=2 entries=10 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:12:34.134566 kernel: kauditd_printk_skb: 136 callbacks suppressed Sep 13 01:12:34.134619 kernel: audit: type=1325 audit(1757725954.132:672): table=filter:70 family=2 entries=10 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:12:34.132000 audit[2568]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe08cf3800 a2=0 a3=7ffe08cf37ec items=0 ppid=1824 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:34.140260 kernel: audit: type=1300 audit(1757725954.132:672): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe08cf3800 a2=0 a3=7ffe08cf37ec items=0 ppid=1824 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:34.140297 kernel: audit: type=1327 audit(1757725954.132:672): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:34.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:34.140000 audit[2568]: NETFILTER_CFG table=nat:71 family=2 entries=36 op=nft_register_chain pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:12:34.143981 kernel: audit: type=1325 audit(1757725954.140:673): table=nat:71 family=2 entries=36 op=nft_register_chain pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:12:34.144016 kernel: audit: type=1300 audit(1757725954.140:673): arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffe08cf3800 a2=0 a3=7ffe08cf37ec items=0 ppid=1824 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:34.140000 audit[2568]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffe08cf3800 a2=0 a3=7ffe08cf37ec items=0 ppid=1824 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:34.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:34.149672 kernel: audit: type=1327 audit(1757725954.140:673): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:12:34.422733 kubelet[1601]: E0913 01:12:34.422660 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:35.423630 kubelet[1601]: E0913 01:12:35.423598 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:36.424752 kubelet[1601]: E0913 01:12:36.424726 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:37.425258 kubelet[1601]: E0913 01:12:37.425232 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:38.425700 kubelet[1601]: E0913 01:12:38.425671 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:39.426260 kubelet[1601]: E0913 01:12:39.426237 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:40.426696 kubelet[1601]: E0913 01:12:40.426671 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:41.427586 kubelet[1601]: E0913 01:12:41.427552 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:42.428596 kubelet[1601]: E0913 01:12:42.428567 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:43.429465 kubelet[1601]: E0913 01:12:43.429442 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:43.868498 systemd[1]: Created slice kubepods-besteffort-pod30af8cbe_fa5e_4f75_b96b_9a744621eff1.slice. Sep 13 01:12:43.957359 kubelet[1601]: I0913 01:12:43.957335 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k52rp\" (UniqueName: \"kubernetes.io/projected/30af8cbe-fa5e-4f75-b96b-9a744621eff1-kube-api-access-k52rp\") pod \"nginx-deployment-8587fbcb89-xp9zk\" (UID: \"30af8cbe-fa5e-4f75-b96b-9a744621eff1\") " pod="default/nginx-deployment-8587fbcb89-xp9zk" Sep 13 01:12:44.170174 env[1249]: time="2025-09-13T01:12:44.170093057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-xp9zk,Uid:30af8cbe-fa5e-4f75-b96b-9a744621eff1,Namespace:default,Attempt:0,}" Sep 13 01:12:44.288319 systemd-networkd[1063]: cali1f21557b55a: Link UP Sep 13 01:12:44.290610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:12:44.290649 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f21557b55a: link becomes ready Sep 13 01:12:44.290590 systemd-networkd[1063]: cali1f21557b55a: Gained carrier Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.227 [INFO][2584] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0 nginx-deployment-8587fbcb89- default 30af8cbe-fa5e-4f75-b96b-9a744621eff1 1291 0 2025-09-13 01:12:43 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.133 nginx-deployment-8587fbcb89-xp9zk eth0 default [] [] [kns.default ksa.default.default] cali1f21557b55a [] [] }} ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.227 [INFO][2584] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.244 [INFO][2598] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" HandleID="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Workload="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.245 [INFO][2598] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" HandleID="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Workload="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5090), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.133", "pod":"nginx-deployment-8587fbcb89-xp9zk", "timestamp":"2025-09-13 01:12:44.244344945 +0000 UTC"}, Hostname:"10.67.124.133", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.245 [INFO][2598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.245 [INFO][2598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.245 [INFO][2598] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.133' Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.257 [INFO][2598] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.264 [INFO][2598] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.270 [INFO][2598] ipam/ipam.go 511: Trying affinity for 192.168.66.64/26 host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.271 [INFO][2598] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.272 [INFO][2598] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.272 [INFO][2598] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.273 [INFO][2598] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314 Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.278 [INFO][2598] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.284 [INFO][2598] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.66/26] block=192.168.66.64/26 handle="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.284 [INFO][2598] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.66/26] handle="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" host="10.67.124.133" Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.284 [INFO][2598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:12:44.300538 env[1249]: 2025-09-13 01:12:44.284 [INFO][2598] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.66/26] IPv6=[] ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" HandleID="k8s-pod-network.22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Workload="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" Sep 13 01:12:44.301042 env[1249]: 2025-09-13 01:12:44.285 [INFO][2584] cni-plugin/k8s.go 418: Populated endpoint ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"30af8cbe-fa5e-4f75-b96b-9a744621eff1", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 12, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-xp9zk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1f21557b55a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:12:44.301042 env[1249]: 2025-09-13 01:12:44.285 [INFO][2584] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.66/32] ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" Sep 13 01:12:44.301042 env[1249]: 2025-09-13 01:12:44.285 [INFO][2584] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1f21557b55a ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" Sep 13 01:12:44.301042 env[1249]: 2025-09-13 01:12:44.290 [INFO][2584] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" Sep 13 01:12:44.301042 env[1249]: 2025-09-13 01:12:44.291 [INFO][2584] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"30af8cbe-fa5e-4f75-b96b-9a744621eff1", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 12, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314", Pod:"nginx-deployment-8587fbcb89-xp9zk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1f21557b55a", MAC:"72:18:9b:7b:87:10", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:12:44.301042 env[1249]: 2025-09-13 01:12:44.299 [INFO][2584] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314" Namespace="default" Pod="nginx-deployment-8587fbcb89-xp9zk" WorkloadEndpoint="10.67.124.133-k8s-nginx--deployment--8587fbcb89--xp9zk-eth0" Sep 13 01:12:44.310277 env[1249]: time="2025-09-13T01:12:44.310174702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:12:44.310277 env[1249]: time="2025-09-13T01:12:44.310198000Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:12:44.310277 env[1249]: time="2025-09-13T01:12:44.310205139Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:12:44.310487 env[1249]: time="2025-09-13T01:12:44.310453514Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314 pid=2620 runtime=io.containerd.runc.v2 Sep 13 01:12:44.321900 systemd[1]: Started cri-containerd-22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314.scope. Sep 13 01:12:44.335905 kernel: audit: type=1400 audit(1757725964.329:674): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.335972 kernel: audit: type=1400 audit(1757725964.329:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.335991 kernel: audit: type=1400 audit(1757725964.329:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.339152 kernel: audit: type=1400 audit(1757725964.329:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.341650 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.344081 kernel: audit: type=1400 audit(1757725964.329:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.349149 kernel: audit: type=1400 audit(1757725964.329:679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.353147 kernel: audit: type=1400 audit(1757725964.329:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.357123 kernel: audit: type=1400 audit(1757725964.329:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.362892 kernel: audit: type=1400 audit(1757725964.329:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.362920 kernel: audit: type=1400 audit(1757725964.335:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.335000 audit: BPF prog-id=107 op=LOAD Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2620 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:44.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232666562633665646465646331653366386166346566653763313562 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2620 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:44.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232666562633665646465646331653366386166346566653763313562 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit: BPF prog-id=108 op=LOAD Sep 13 01:12:44.337000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000335d10 items=0 ppid=2620 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:44.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232666562633665646465646331653366386166346566653763313562 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit: BPF prog-id=109 op=LOAD Sep 13 01:12:44.337000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000335d58 items=0 ppid=2620 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:44.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232666562633665646465646331653366386166346566653763313562 Sep 13 01:12:44.337000 audit: BPF prog-id=109 op=UNLOAD Sep 13 01:12:44.337000 audit: BPF prog-id=108 op=UNLOAD Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:44.337000 audit: BPF prog-id=110 op=LOAD Sep 13 01:12:44.337000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b8168 items=0 ppid=2620 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:44.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232666562633665646465646331653366386166346566653763313562 Sep 13 01:12:44.372246 env[1249]: time="2025-09-13T01:12:44.372217216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-xp9zk,Uid:30af8cbe-fa5e-4f75-b96b-9a744621eff1,Namespace:default,Attempt:0,} returns sandbox id \"22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314\"" Sep 13 01:12:44.373350 env[1249]: time="2025-09-13T01:12:44.373337631Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:12:44.377000 audit[2657]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2657 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:12:44.377000 audit[2657]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffc9b01bc80 a2=0 a3=7ffc9b01bc6c items=0 ppid=2212 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:44.377000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:12:44.394974 kubelet[1601]: E0913 01:12:44.394939 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:44.430497 kubelet[1601]: E0913 01:12:44.430414 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:45.074737 systemd[1]: run-containerd-runc-k8s.io-22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314-runc.hdF6jv.mount: Deactivated successfully. Sep 13 01:12:45.431131 kubelet[1601]: E0913 01:12:45.430898 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:46.007228 systemd-networkd[1063]: cali1f21557b55a: Gained IPv6LL Sep 13 01:12:46.432015 kubelet[1601]: E0913 01:12:46.431817 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:46.662249 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2118569048.mount: Deactivated successfully. Sep 13 01:12:47.431604 systemd[1]: run-containerd-runc-k8s.io-d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f-runc.aAabGP.mount: Deactivated successfully. Sep 13 01:12:47.432042 kubelet[1601]: E0913 01:12:47.431972 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:47.701555 env[1249]: time="2025-09-13T01:12:47.701331704Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:47.702348 env[1249]: time="2025-09-13T01:12:47.702335162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:47.703956 env[1249]: time="2025-09-13T01:12:47.703944845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:47.704904 env[1249]: time="2025-09-13T01:12:47.704892803Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:12:47.705291 env[1249]: time="2025-09-13T01:12:47.705276930Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 01:12:47.706774 env[1249]: time="2025-09-13T01:12:47.706756220Z" level=info msg="CreateContainer within sandbox \"22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 01:12:47.714286 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount22933936.mount: Deactivated successfully. Sep 13 01:12:47.717843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4033996743.mount: Deactivated successfully. Sep 13 01:12:47.720118 env[1249]: time="2025-09-13T01:12:47.720088635Z" level=info msg="CreateContainer within sandbox \"22febc6eddedc1e3f8af4efe7c15bc36e55668632fe6af9b3991e94abd77b314\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5bdb063c79def3f5db0e6f2f625690354e4751ff658aafb204abaeda16f5e498\"" Sep 13 01:12:47.720407 env[1249]: time="2025-09-13T01:12:47.720393351Z" level=info msg="StartContainer for \"5bdb063c79def3f5db0e6f2f625690354e4751ff658aafb204abaeda16f5e498\"" Sep 13 01:12:47.732488 systemd[1]: Started cri-containerd-5bdb063c79def3f5db0e6f2f625690354e4751ff658aafb204abaeda16f5e498.scope. Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit: BPF prog-id=111 op=LOAD Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2620 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:47.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646230363363373964656633663564623065366632663632353639 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2620 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:47.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646230363363373964656633663564623065366632663632353639 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit: BPF prog-id=112 op=LOAD Sep 13 01:12:47.741000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00037c320 items=0 ppid=2620 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:47.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646230363363373964656633663564623065366632663632353639 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit: BPF prog-id=113 op=LOAD Sep 13 01:12:47.741000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00037c368 items=0 ppid=2620 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:47.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646230363363373964656633663564623065366632663632353639 Sep 13 01:12:47.741000 audit: BPF prog-id=113 op=UNLOAD Sep 13 01:12:47.741000 audit: BPF prog-id=112 op=UNLOAD Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:12:47.741000 audit: BPF prog-id=114 op=LOAD Sep 13 01:12:47.741000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037c778 items=0 ppid=2620 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:12:47.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562646230363363373964656633663564623065366632663632353639 Sep 13 01:12:47.757078 env[1249]: time="2025-09-13T01:12:47.757057087Z" level=info msg="StartContainer for \"5bdb063c79def3f5db0e6f2f625690354e4751ff658aafb204abaeda16f5e498\" returns successfully" Sep 13 01:12:48.432374 kubelet[1601]: E0913 01:12:48.432344 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:49.432648 kubelet[1601]: E0913 01:12:49.432613 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:50.433542 kubelet[1601]: E0913 01:12:50.433515 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:51.433857 kubelet[1601]: E0913 01:12:51.433828 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:52.434422 kubelet[1601]: E0913 01:12:52.434389 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:53.434959 kubelet[1601]: E0913 01:12:53.434929 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:54.435560 kubelet[1601]: E0913 01:12:54.435531 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:55.436427 kubelet[1601]: E0913 01:12:55.436399 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:56.437167 kubelet[1601]: E0913 01:12:56.437138 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:57.438013 kubelet[1601]: E0913 01:12:57.437990 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:58.438736 kubelet[1601]: E0913 01:12:58.438712 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:12:59.439476 kubelet[1601]: E0913 01:12:59.439446 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:00.440658 kubelet[1601]: E0913 01:13:00.440528 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:01.441554 kubelet[1601]: E0913 01:13:01.441526 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:02.442319 kubelet[1601]: E0913 01:13:02.442296 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:03.442794 kubelet[1601]: E0913 01:13:03.442762 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:04.395171 kubelet[1601]: E0913 01:13:04.395145 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:04.438963 env[1249]: time="2025-09-13T01:13:04.438778102Z" level=info msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\"" Sep 13 01:13:04.442829 kubelet[1601]: E0913 01:13:04.442816 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:05.443621 kubelet[1601]: E0913 01:13:05.443596 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:06.444282 kubelet[1601]: E0913 01:13:06.444251 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:07.444551 kubelet[1601]: E0913 01:13:07.444523 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:08.445289 kubelet[1601]: E0913 01:13:08.445256 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:09.446020 kubelet[1601]: E0913 01:13:09.445984 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:10.446807 kubelet[1601]: E0913 01:13:10.446782 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:11.447519 kubelet[1601]: E0913 01:13:11.447491 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:12.448313 kubelet[1601]: E0913 01:13:12.448280 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:13.448482 kubelet[1601]: E0913 01:13:13.448457 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:14.448700 kubelet[1601]: E0913 01:13:14.448672 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:15.449658 kubelet[1601]: E0913 01:13:15.449634 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:15.784571 kubelet[1601]: E0913 01:13:15.784539 1601 controller.go:195] "Failed to update lease" err="Put \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:16.450867 kubelet[1601]: E0913 01:13:16.450833 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:16.460097 kubelet[1601]: E0913 01:13:16.460057 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"NetworkUnavailable\\\"},{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:13:06Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:13:06Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:13:06Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:13:06Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1\\\",\\\"ghcr.io/flatcar/calico/node:v3.30.3\\\"],\\\"sizeBytes\\\":157078201},{\\\"names\\\":[\\\"ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530\\\",\\\"ghcr.io/flatcar/nginx:latest\\\"],\\\"sizeBytes\\\":73307688},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87\\\",\\\"ghcr.io/flatcar/calico/cni:v3.30.3\\\"],\\\"sizeBytes\\\":71933316},{\\\"names\\\":[\\\"registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae\\\",\\\"registry.k8s.io/kube-proxy:v1.31.13\\\"],\\\"sizeBytes\\\":30409271},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f\\\",\\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\\\"],\\\"sizeBytes\\\":16191197},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2\\\",\\\"ghcr.io/flatcar/calico/csi:v3.30.3\\\"],\\\"sizeBytes\\\":10253230},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9\\\",\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\\\"],\\\"sizeBytes\\\":5939323},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db\\\",\\\"registry.k8s.io/pause:3.6\\\"],\\\"sizeBytes\\\":301773}]}}\" for node \"10.67.124.133\": Patch \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:17.418710 systemd[1]: run-containerd-runc-k8s.io-d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f-runc.PNgMdm.mount: Deactivated successfully. Sep 13 01:13:17.451658 kubelet[1601]: E0913 01:13:17.451625 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:18.451743 kubelet[1601]: E0913 01:13:18.451701 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:19.452599 kubelet[1601]: E0913 01:13:19.452532 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:20.452618 kubelet[1601]: E0913 01:13:20.452587 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:21.453272 kubelet[1601]: E0913 01:13:21.453245 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:22.453606 kubelet[1601]: E0913 01:13:22.453570 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:23.454448 kubelet[1601]: E0913 01:13:23.454403 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:24.394828 kubelet[1601]: E0913 01:13:24.394803 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:24.455433 kubelet[1601]: E0913 01:13:24.455415 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:25.456301 kubelet[1601]: E0913 01:13:25.456274 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:25.785759 kubelet[1601]: E0913 01:13:25.785682 1601 controller.go:195] "Failed to update lease" err="Put \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:26.457032 kubelet[1601]: E0913 01:13:26.456992 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:26.460624 kubelet[1601]: E0913 01:13:26.460606 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:27.457778 kubelet[1601]: E0913 01:13:27.457755 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:28.458409 kubelet[1601]: E0913 01:13:28.458380 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:29.458752 kubelet[1601]: E0913 01:13:29.458730 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:30.459126 kubelet[1601]: E0913 01:13:30.459097 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:31.459569 kubelet[1601]: E0913 01:13:31.459546 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:32.460901 kubelet[1601]: E0913 01:13:32.460879 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:33.462019 kubelet[1601]: E0913 01:13:33.461994 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:34.463365 kubelet[1601]: E0913 01:13:34.463346 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:35.464473 kubelet[1601]: E0913 01:13:35.464450 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:35.786771 kubelet[1601]: E0913 01:13:35.786745 1601 controller.go:195] "Failed to update lease" err="Put \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:36.460775 kubelet[1601]: E0913 01:13:36.460752 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:36.464874 kubelet[1601]: E0913 01:13:36.464853 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:37.465539 kubelet[1601]: E0913 01:13:37.465501 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:38.466515 kubelet[1601]: E0913 01:13:38.466457 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:39.467538 kubelet[1601]: E0913 01:13:39.467511 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:40.467746 kubelet[1601]: E0913 01:13:40.467722 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:41.468458 kubelet[1601]: E0913 01:13:41.468435 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:42.469356 kubelet[1601]: E0913 01:13:42.469331 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:43.470600 kubelet[1601]: E0913 01:13:43.470573 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:44.395039 kubelet[1601]: E0913 01:13:44.395006 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:44.471009 kubelet[1601]: E0913 01:13:44.470991 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:45.471999 kubelet[1601]: E0913 01:13:45.471971 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:45.787604 kubelet[1601]: E0913 01:13:45.787567 1601 controller.go:195] "Failed to update lease" err="Put \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:46.461233 kubelet[1601]: E0913 01:13:46.461137 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 01:13:46.472454 kubelet[1601]: E0913 01:13:46.472439 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:47.417853 systemd[1]: run-containerd-runc-k8s.io-d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f-runc.3KJd5v.mount: Deactivated successfully. Sep 13 01:13:47.473195 kubelet[1601]: E0913 01:13:47.473162 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:48.474012 kubelet[1601]: E0913 01:13:48.473970 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:49.474653 kubelet[1601]: E0913 01:13:49.474631 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:50.475742 kubelet[1601]: E0913 01:13:50.475719 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:50.569906 kubelet[1601]: W0913 01:13:50.569855 1601 reflector.go:484] object-"kube-system"/"kube-proxy": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.570012 kubelet[1601]: E0913 01:13:50.569929 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": http2: client connection lost" Sep 13 01:13:50.570012 kubelet[1601]: E0913 01:13:50.569939 1601 kubelet_node_status.go:522] "Unable to update node status" err="update node status exceeds retry count" Sep 13 01:13:50.570012 kubelet[1601]: E0913 01:13:50.569962 1601 controller.go:195] "Failed to update lease" err="Put \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": http2: client connection lost" Sep 13 01:13:50.570012 kubelet[1601]: I0913 01:13:50.569972 1601 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Sep 13 01:13:50.570166 kubelet[1601]: W0913 01:13:50.570098 1601 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.570196 kubelet[1601]: W0913 01:13:50.570167 1601 reflector.go:484] pkg/kubelet/config/apiserver.go:66: watch of *v1.Pod ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.570196 kubelet[1601]: W0913 01:13:50.570185 1601 reflector.go:484] object-"calico-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.570239 kubelet[1601]: W0913 01:13:50.570198 1601 reflector.go:484] object-"kube-system"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.570239 kubelet[1601]: W0913 01:13:50.570208 1601 reflector.go:484] object-"calico-system"/"tigera-ca-bundle": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.574041 kubelet[1601]: E0913 01:13:50.570230 1601 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/events\": http2: client connection lost" event=< Sep 13 01:13:50.574041 kubelet[1601]: &Event{ObjectMeta:{calico-node-wnpn4.1864b2825716970f calico-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:calico-node-wnpn4,UID:1df86ad7-c474-46e6-9c1d-feb438a896e9,APIVersion:v1,ResourceVersion:1113,FieldPath:spec.containers{calico-node},},Reason:Unhealthy,Message:Readiness probe failed: 2025-09-13 01:13:47.455 [INFO][326] node/health.go 202: Number of node(s) with BGP peering established = 1 Sep 13 01:13:50.574041 kubelet[1601]: calico/node is not ready: felix is not ready: readiness probe reporting 503 Sep 13 01:13:50.574041 kubelet[1601]: ,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,LastTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,} Sep 13 01:13:50.574041 kubelet[1601]: > Sep 13 01:13:50.574041 kubelet[1601]: W0913 01:13:50.570287 1601 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.574041 kubelet[1601]: W0913 01:13:50.570299 1601 reflector.go:484] object-"calico-system"/"cni-config": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.574041 kubelet[1601]: W0913 01:13:50.570310 1601 reflector.go:484] object-"calico-system"/"node-certs": watch of *v1.Secret ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.574041 kubelet[1601]: W0913 01:13:50.570322 1601 reflector.go:484] object-"default"/"kube-root-ca.crt": watch of *v1.ConfigMap ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.574041 kubelet[1601]: W0913 01:13:50.570333 1601 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:50.574041 kubelet[1601]: W0913 01:13:50.570343 1601 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: an error on the server ("unable to decode an event from the watch stream: http2: client connection lost") has prevented the request from succeeding Sep 13 01:13:51.476901 kubelet[1601]: E0913 01:13:51.476881 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:52.477888 kubelet[1601]: E0913 01:13:52.477857 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:53.478408 kubelet[1601]: E0913 01:13:53.478389 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:54.479318 kubelet[1601]: E0913 01:13:54.479295 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:55.480671 kubelet[1601]: E0913 01:13:55.480643 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:56.481428 kubelet[1601]: E0913 01:13:56.481402 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:57.481992 kubelet[1601]: E0913 01:13:57.481969 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:58.483289 kubelet[1601]: E0913 01:13:58.483265 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:13:59.484064 kubelet[1601]: E0913 01:13:59.484040 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:00.484746 kubelet[1601]: E0913 01:14:00.484718 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:00.570666 kubelet[1601]: E0913 01:14:00.570632 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": context deadline exceeded" interval="200ms" Sep 13 01:14:01.402644 kubelet[1601]: W0913 01:14:01.402616 1601 reflector.go:561] pkg/kubelet/config/apiserver.go:66: failed to list *v1.Pod: Get "https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308": net/http: TLS handshake timeout Sep 13 01:14:01.402802 kubelet[1601]: E0913 01:14:01.402789 1601 reflector.go:158] "Unhandled Error" err="pkg/kubelet/config/apiserver.go:66: Failed to watch *v1.Pod: failed to list *v1.Pod: Get \"https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:01.477429 env[1249]: time="2025-09-13T01:14:01.477387974Z" level=error msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" failed" error="failed to destroy network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (delete): Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/ipamhandles/calico-system.csi-node-driver-l9fgx\": net/http: TLS handshake timeout - error from a previous attempt: http2: client connection lost" Sep 13 01:14:01.477856 kubelet[1601]: E0913 01:14:01.477816 1601 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (delete): Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/ipamhandles/calico-system.csi-node-driver-l9fgx\": net/http: TLS handshake timeout - error from a previous attempt: http2: client connection lost" podSandboxID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:14:01.477916 kubelet[1601]: E0913 01:14:01.477867 1601 kuberuntime_gc.go:180] "Failed to stop sandbox before removing" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\": plugin type=\"calico\" failed (delete): Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/ipamhandles/calico-system.csi-node-driver-l9fgx\": net/http: TLS handshake timeout - error from a previous attempt: http2: client connection lost" sandboxID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:14:01.484981 kubelet[1601]: E0913 01:14:01.484965 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:01.569876 kubelet[1601]: W0913 01:14:01.569827 1601 reflector.go:561] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:01.569876 kubelet[1601]: E0913 01:14:01.569875 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:01.586320 kubelet[1601]: W0913 01:14:01.586240 1601 reflector.go:561] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:01.586320 kubelet[1601]: E0913 01:14:01.586292 1601 reflector.go:158] "Unhandled Error" err="object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:01.594517 kubelet[1601]: W0913 01:14:01.594499 1601 reflector.go:561] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:01.594556 kubelet[1601]: E0913 01:14:01.594522 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"tigera-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:01.666502 kubelet[1601]: W0913 01:14:01.666026 1601 reflector.go:561] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:01.666502 kubelet[1601]: E0913 01:14:01.666055 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:01.706172 kubelet[1601]: W0913 01:14:01.706145 1601 reflector.go:561] object-"calico-system"/"node-certs": failed to list *v1.Secret: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593": net/http: TLS handshake timeout Sep 13 01:14:01.706172 kubelet[1601]: E0913 01:14:01.706171 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:01.722622 kubelet[1601]: W0913 01:14:01.722582 1601 reflector.go:561] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:01.722622 kubelet[1601]: E0913 01:14:01.722603 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:01.735925 kubelet[1601]: W0913 01:14:01.735908 1601 reflector.go:561] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:01.736072 kubelet[1601]: E0913 01:14:01.735928 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:02.485588 kubelet[1601]: E0913 01:14:02.485552 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:02.892482 kubelet[1601]: W0913 01:14:02.892265 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?resourceVersion=1": net/http: TLS handshake timeout Sep 13 01:14:02.892482 kubelet[1601]: E0913 01:14:02.892295 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?resourceVersion=1\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:03.272181 kubelet[1601]: W0913 01:14:03.272159 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?resourceVersion=667": net/http: TLS handshake timeout Sep 13 01:14:03.272312 kubelet[1601]: E0913 01:14:03.272297 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?resourceVersion=667\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:03.433491 kubelet[1601]: W0913 01:14:03.433466 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3D10.67.124.133&resourceVersion=1259": net/http: TLS handshake timeout Sep 13 01:14:03.433620 kubelet[1601]: E0913 01:14:03.433607 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3D10.67.124.133&resourceVersion=1259\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:03.486328 kubelet[1601]: E0913 01:14:03.486302 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:03.598564 kubelet[1601]: W0913 01:14:03.598160 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&resourceVersion=1073": net/http: TLS handshake timeout Sep 13 01:14:03.598564 kubelet[1601]: E0913 01:14:03.598197 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&resourceVersion=1073\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:04.394817 kubelet[1601]: E0913 01:14:04.394790 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:04.487156 kubelet[1601]: E0913 01:14:04.487134 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:05.487820 kubelet[1601]: E0913 01:14:05.487790 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:06.488093 kubelet[1601]: E0913 01:14:06.488068 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:07.488602 kubelet[1601]: E0913 01:14:07.488572 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:08.488978 kubelet[1601]: E0913 01:14:08.488955 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:09.489754 kubelet[1601]: E0913 01:14:09.489726 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:10.063833 kubelet[1601]: E0913 01:14:10.063765 1601 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/events\": net/http: TLS handshake timeout" event=< Sep 13 01:14:10.063833 kubelet[1601]: &Event{ObjectMeta:{calico-node-wnpn4.1864b2825716970f calico-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:calico-node-wnpn4,UID:1df86ad7-c474-46e6-9c1d-feb438a896e9,APIVersion:v1,ResourceVersion:1113,FieldPath:spec.containers{calico-node},},Reason:Unhealthy,Message:Readiness probe failed: 2025-09-13 01:13:47.455 [INFO][326] node/health.go 202: Number of node(s) with BGP peering established = 1 Sep 13 01:14:10.063833 kubelet[1601]: calico/node is not ready: felix is not ready: readiness probe reporting 503 Sep 13 01:14:10.063833 kubelet[1601]: ,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,LastTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,} Sep 13 01:14:10.063833 kubelet[1601]: > Sep 13 01:14:10.490279 kubelet[1601]: E0913 01:14:10.490258 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:10.573200 kubelet[1601]: E0913 01:14:10.573157 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"NetworkUnavailable\\\"},{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:14:00Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:14:00Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:14:00Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-09-13T01:14:00Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1\\\",\\\"ghcr.io/flatcar/calico/node:v3.30.3\\\"],\\\"sizeBytes\\\":157078201},{\\\"names\\\":[\\\"ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530\\\",\\\"ghcr.io/flatcar/nginx:latest\\\"],\\\"sizeBytes\\\":73307688},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87\\\",\\\"ghcr.io/flatcar/calico/cni:v3.30.3\\\"],\\\"sizeBytes\\\":71933316},{\\\"names\\\":[\\\"registry.k8s.io/kube-proxy@sha256:a39637326e88d128d38da6ff2b2ceb4e856475887bfcb5f7a55734d4f63d9fae\\\",\\\"registry.k8s.io/kube-proxy:v1.31.13\\\"],\\\"sizeBytes\\\":30409271},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f\\\",\\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\\\"],\\\"sizeBytes\\\":16191197},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2\\\",\\\"ghcr.io/flatcar/calico/csi:v3.30.3\\\"],\\\"sizeBytes\\\":10253230},{\\\"names\\\":[\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9\\\",\\\"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\\\"],\\\"sizeBytes\\\":5939323},{\\\"names\\\":[\\\"registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db\\\",\\\"registry.k8s.io/pause:3.6\\\"],\\\"sizeBytes\\\":301773}]}}\" for node \"10.67.124.133\": Patch \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133/status?timeout=10s\": net/http: TLS handshake timeout" Sep 13 01:14:10.772348 kubelet[1601]: E0913 01:14:10.771948 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="400ms" Sep 13 01:14:11.490633 kubelet[1601]: E0913 01:14:11.490604 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:12.491513 kubelet[1601]: E0913 01:14:12.491483 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:13.241320 kubelet[1601]: W0913 01:14:13.241289 1601 reflector.go:561] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:13.241431 kubelet[1601]: E0913 01:14:13.241323 1601 reflector.go:158] "Unhandled Error" err="object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:13.389314 kubelet[1601]: W0913 01:14:13.389290 1601 reflector.go:561] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:13.389439 kubelet[1601]: E0913 01:14:13.389426 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:13.492617 kubelet[1601]: E0913 01:14:13.492360 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:13.658600 kubelet[1601]: W0913 01:14:13.658562 1601 reflector.go:561] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:13.658702 kubelet[1601]: E0913 01:14:13.658604 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"tigera-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:13.731989 kubelet[1601]: W0913 01:14:13.731960 1601 reflector.go:561] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:13.731989 kubelet[1601]: E0913 01:14:13.731990 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:13.770614 kubelet[1601]: W0913 01:14:13.770354 1601 reflector.go:561] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:13.770614 kubelet[1601]: E0913 01:14:13.770389 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:13.801730 kubelet[1601]: W0913 01:14:13.801700 1601 reflector.go:561] pkg/kubelet/config/apiserver.go:66: failed to list *v1.Pod: Get "https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308": net/http: TLS handshake timeout Sep 13 01:14:13.801789 kubelet[1601]: E0913 01:14:13.801737 1601 reflector.go:158] "Unhandled Error" err="pkg/kubelet/config/apiserver.go:66: Failed to watch *v1.Pod: failed to list *v1.Pod: Get \"https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:13.900652 kubelet[1601]: W0913 01:14:13.900609 1601 reflector.go:561] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:13.900652 kubelet[1601]: E0913 01:14:13.900651 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:13.936491 kubelet[1601]: W0913 01:14:13.936474 1601 reflector.go:561] object-"calico-system"/"node-certs": failed to list *v1.Secret: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593": net/http: TLS handshake timeout Sep 13 01:14:13.936582 kubelet[1601]: E0913 01:14:13.936572 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:14.493036 kubelet[1601]: E0913 01:14:14.492977 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:15.493800 kubelet[1601]: E0913 01:14:15.493769 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:16.494716 kubelet[1601]: E0913 01:14:16.494684 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:17.104734 kubelet[1601]: W0913 01:14:17.104670 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?resourceVersion=667": net/http: TLS handshake timeout Sep 13 01:14:17.104734 kubelet[1601]: E0913 01:14:17.104715 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?resourceVersion=667\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:17.417912 systemd[1]: run-containerd-runc-k8s.io-d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f-runc.IQ9ohF.mount: Deactivated successfully. Sep 13 01:14:17.494977 kubelet[1601]: E0913 01:14:17.494951 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:18.109723 kubelet[1601]: W0913 01:14:18.109634 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?resourceVersion=1": net/http: TLS handshake timeout Sep 13 01:14:18.109723 kubelet[1601]: E0913 01:14:18.109698 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?resourceVersion=1\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:18.495575 kubelet[1601]: E0913 01:14:18.495549 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:18.722044 kubelet[1601]: W0913 01:14:18.722001 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&resourceVersion=1073": net/http: TLS handshake timeout Sep 13 01:14:18.722044 kubelet[1601]: E0913 01:14:18.722045 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&resourceVersion=1073\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:19.496119 kubelet[1601]: E0913 01:14:19.496086 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:19.563255 kubelet[1601]: W0913 01:14:19.563205 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3D10.67.124.133&resourceVersion=1259": net/http: TLS handshake timeout Sep 13 01:14:19.563355 kubelet[1601]: E0913 01:14:19.563263 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3D10.67.124.133&resourceVersion=1259\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:20.496362 kubelet[1601]: E0913 01:14:20.496306 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:20.574186 kubelet[1601]: E0913 01:14:20.574152 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Sep 13 01:14:21.174421 kubelet[1601]: E0913 01:14:21.174382 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="800ms" Sep 13 01:14:21.496889 kubelet[1601]: E0913 01:14:21.496869 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:22.497852 kubelet[1601]: E0913 01:14:22.497806 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:23.498514 kubelet[1601]: E0913 01:14:23.498487 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:24.394560 kubelet[1601]: E0913 01:14:24.394489 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:24.499496 kubelet[1601]: E0913 01:14:24.499447 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:25.499869 kubelet[1601]: E0913 01:14:25.499837 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:26.500233 kubelet[1601]: E0913 01:14:26.500205 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:27.203344 kubelet[1601]: W0913 01:14:27.203314 1601 reflector.go:561] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:27.203456 kubelet[1601]: E0913 01:14:27.203349 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:27.398801 kubelet[1601]: W0913 01:14:27.398771 1601 reflector.go:561] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:27.398801 kubelet[1601]: E0913 01:14:27.398805 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"tigera-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:27.500792 kubelet[1601]: E0913 01:14:27.500767 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:28.501286 kubelet[1601]: E0913 01:14:28.501258 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:28.765806 kubelet[1601]: W0913 01:14:28.765551 1601 reflector.go:561] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:28.766022 kubelet[1601]: E0913 01:14:28.766006 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:28.843523 kubelet[1601]: W0913 01:14:28.843481 1601 reflector.go:561] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:28.843680 kubelet[1601]: E0913 01:14:28.843657 1601 reflector.go:158] "Unhandled Error" err="object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:29.064620 kubelet[1601]: W0913 01:14:29.064162 1601 reflector.go:561] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:29.064761 kubelet[1601]: E0913 01:14:29.064743 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:29.065333 kubelet[1601]: W0913 01:14:29.065304 1601 reflector.go:561] object-"calico-system"/"node-certs": failed to list *v1.Secret: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593": net/http: TLS handshake timeout Sep 13 01:14:29.065333 kubelet[1601]: E0913 01:14:29.065333 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:29.467980 kubelet[1601]: W0913 01:14:29.467619 1601 reflector.go:561] pkg/kubelet/config/apiserver.go:66: failed to list *v1.Pod: Get "https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308": net/http: TLS handshake timeout Sep 13 01:14:29.467980 kubelet[1601]: E0913 01:14:29.467687 1601 reflector.go:158] "Unhandled Error" err="pkg/kubelet/config/apiserver.go:66: Failed to watch *v1.Pod: failed to list *v1.Pod: Get \"https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:29.502338 kubelet[1601]: E0913 01:14:29.502313 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:29.576633 kubelet[1601]: W0913 01:14:29.576552 1601 reflector.go:561] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:29.576633 kubelet[1601]: E0913 01:14:29.576620 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:30.066080 kubelet[1601]: E0913 01:14:30.065980 1601 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/events\": net/http: TLS handshake timeout" event=< Sep 13 01:14:30.066080 kubelet[1601]: &Event{ObjectMeta:{calico-node-wnpn4.1864b2825716970f calico-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:calico-node-wnpn4,UID:1df86ad7-c474-46e6-9c1d-feb438a896e9,APIVersion:v1,ResourceVersion:1113,FieldPath:spec.containers{calico-node},},Reason:Unhealthy,Message:Readiness probe failed: 2025-09-13 01:13:47.455 [INFO][326] node/health.go 202: Number of node(s) with BGP peering established = 1 Sep 13 01:14:30.066080 kubelet[1601]: calico/node is not ready: felix is not ready: readiness probe reporting 503 Sep 13 01:14:30.066080 kubelet[1601]: ,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,LastTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,} Sep 13 01:14:30.066080 kubelet[1601]: > Sep 13 01:14:30.503044 kubelet[1601]: E0913 01:14:30.503021 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:30.574480 kubelet[1601]: E0913 01:14:30.574420 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Sep 13 01:14:31.503377 kubelet[1601]: E0913 01:14:31.503347 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:31.976084 kubelet[1601]: E0913 01:14:31.975909 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Sep 13 01:14:32.503772 kubelet[1601]: E0913 01:14:32.503744 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:33.504199 kubelet[1601]: E0913 01:14:33.504173 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:33.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-196.251.114.29:51824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:14:33.724889 systemd[1]: Started sshd@7-139.178.70.101:22-196.251.114.29:51824.service. Sep 13 01:14:33.726091 kernel: kauditd_printk_skb: 107 callbacks suppressed Sep 13 01:14:33.726149 kernel: audit: type=1130 audit(1757726073.723:711): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-196.251.114.29:51824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:14:33.981315 sshd[2968]: kex_exchange_identification: Connection closed by remote host Sep 13 01:14:33.981607 sshd[2968]: Connection closed by 196.251.114.29 port 51824 Sep 13 01:14:33.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-196.251.114.29:51824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:14:33.982124 systemd[1]: sshd@7-139.178.70.101:22-196.251.114.29:51824.service: Deactivated successfully. Sep 13 01:14:33.986267 kernel: audit: type=1131 audit(1757726073.981:712): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-196.251.114.29:51824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:14:34.504803 kubelet[1601]: E0913 01:14:34.504777 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:35.504879 kubelet[1601]: E0913 01:14:35.504849 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:36.505946 kubelet[1601]: E0913 01:14:36.505922 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:37.506452 kubelet[1601]: E0913 01:14:37.506429 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:38.266892 kubelet[1601]: W0913 01:14:38.266867 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&resourceVersion=1073": net/http: TLS handshake timeout Sep 13 01:14:38.267041 kubelet[1601]: E0913 01:14:38.267028 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&resourceVersion=1073\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:38.507771 kubelet[1601]: E0913 01:14:38.507748 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:38.796849 kubelet[1601]: W0913 01:14:38.796809 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?resourceVersion=667": net/http: TLS handshake timeout Sep 13 01:14:38.796969 kubelet[1601]: E0913 01:14:38.796956 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?resourceVersion=667\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:39.508908 kubelet[1601]: E0913 01:14:39.508854 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:40.477572 kubelet[1601]: W0913 01:14:40.477542 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3D10.67.124.133&resourceVersion=1259": net/http: TLS handshake timeout Sep 13 01:14:40.477723 kubelet[1601]: E0913 01:14:40.477704 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3D10.67.124.133&resourceVersion=1259\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:40.509765 kubelet[1601]: E0913 01:14:40.509736 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:40.575526 kubelet[1601]: E0913 01:14:40.575499 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" Sep 13 01:14:40.728957 kubelet[1601]: W0913 01:14:40.728658 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?resourceVersion=1": net/http: TLS handshake timeout Sep 13 01:14:40.728957 kubelet[1601]: E0913 01:14:40.728706 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?resourceVersion=1\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:41.510197 kubelet[1601]: E0913 01:14:41.510164 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:42.510665 kubelet[1601]: E0913 01:14:42.510637 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:43.511479 kubelet[1601]: E0913 01:14:43.511452 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:43.576905 kubelet[1601]: E0913 01:14:43.576864 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.67.124.133?timeout=10s\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)" interval="3.2s" Sep 13 01:14:44.395147 kubelet[1601]: E0913 01:14:44.395102 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:44.511891 kubelet[1601]: E0913 01:14:44.511873 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:45.512718 kubelet[1601]: E0913 01:14:45.512692 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:45.680695 kubelet[1601]: W0913 01:14:45.680632 1601 reflector.go:561] object-"calico-system"/"node-certs": failed to list *v1.Secret: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593": net/http: TLS handshake timeout Sep 13 01:14:45.680695 kubelet[1601]: E0913 01:14:45.680693 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/secrets?fieldSelector=metadata.name%3Dnode-certs&resourceVersion=593\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:46.041957 kubelet[1601]: W0913 01:14:46.041910 1601 reflector.go:561] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:46.042143 kubelet[1601]: E0913 01:14:46.042108 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:46.512943 kubelet[1601]: E0913 01:14:46.512912 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:46.638654 kubelet[1601]: W0913 01:14:46.638590 1601 reflector.go:561] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:46.638822 kubelet[1601]: E0913 01:14:46.638806 1601 reflector.go:158] "Unhandled Error" err="object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/default/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:47.302556 kubelet[1601]: W0913 01:14:47.302500 1601 reflector.go:561] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:47.302556 kubelet[1601]: E0913 01:14:47.302555 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-proxy&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:47.364268 kubelet[1601]: W0913 01:14:47.364215 1601 reflector.go:561] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:47.364384 kubelet[1601]: E0913 01:14:47.364274 1601 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/kube-system/configmaps?fieldSelector=metadata.name%3Dkube-root-ca.crt&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:47.514145 kubelet[1601]: E0913 01:14:47.514122 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:47.896876 kubelet[1601]: W0913 01:14:47.896793 1601 reflector.go:561] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:47.896876 kubelet[1601]: E0913 01:14:47.896849 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"tigera-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dtigera-ca-bundle&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:48.515201 kubelet[1601]: E0913 01:14:48.515165 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:49.515857 kubelet[1601]: E0913 01:14:49.515817 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:49.712069 kubelet[1601]: W0913 01:14:49.711992 1601 reflector.go:561] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: Get "https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649": net/http: TLS handshake timeout Sep 13 01:14:49.712069 kubelet[1601]: E0913 01:14:49.712059 1601 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/configmaps?fieldSelector=metadata.name%3Dcni-config&resourceVersion=649\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:50.066987 kubelet[1601]: E0913 01:14:50.066898 1601 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/calico-system/events\": net/http: TLS handshake timeout" event=< Sep 13 01:14:50.066987 kubelet[1601]: &Event{ObjectMeta:{calico-node-wnpn4.1864b2825716970f calico-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:calico-system,Name:calico-node-wnpn4,UID:1df86ad7-c474-46e6-9c1d-feb438a896e9,APIVersion:v1,ResourceVersion:1113,FieldPath:spec.containers{calico-node},},Reason:Unhealthy,Message:Readiness probe failed: 2025-09-13 01:13:47.455 [INFO][326] node/health.go 202: Number of node(s) with BGP peering established = 1 Sep 13 01:14:50.066987 kubelet[1601]: calico/node is not ready: felix is not ready: readiness probe reporting 503 Sep 13 01:14:50.066987 kubelet[1601]: ,Source:EventSource{Component:kubelet,Host:10.67.124.133,},FirstTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,LastTimestamp:2025-09-13 01:13:47.457926927 +0000 UTC m=+103.405723904,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.133,} Sep 13 01:14:50.066987 kubelet[1601]: > Sep 13 01:14:50.220986 kubelet[1601]: W0913 01:14:50.220926 1601 reflector.go:561] pkg/kubelet/config/apiserver.go:66: failed to list *v1.Pod: Get "https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308": net/http: TLS handshake timeout Sep 13 01:14:50.220986 kubelet[1601]: E0913 01:14:50.220983 1601 reflector.go:158] "Unhandled Error" err="pkg/kubelet/config/apiserver.go:66: Failed to watch *v1.Pod: failed to list *v1.Pod: Get \"https://139.178.70.100:6443/api/v1/pods?fieldSelector=spec.nodeName%3D10.67.124.133&resourceVersion=1308\": net/http: TLS handshake timeout" logger="UnhandledError" Sep 13 01:14:50.516218 kubelet[1601]: E0913 01:14:50.516155 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:50.576668 kubelet[1601]: E0913 01:14:50.576605 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.67.124.133\": Get \"https://139.178.70.100:6443/api/v1/nodes/10.67.124.133?timeout=10s\": net/http: TLS handshake timeout" Sep 13 01:14:50.576668 kubelet[1601]: E0913 01:14:50.576625 1601 kubelet_node_status.go:522] "Unable to update node status" err="update node status exceeds retry count" Sep 13 01:14:51.517086 kubelet[1601]: E0913 01:14:51.517020 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:52.517827 kubelet[1601]: E0913 01:14:52.517780 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:53.518934 kubelet[1601]: E0913 01:14:53.518895 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.247809 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.247849 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.247868 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.252579 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.252609 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.257457 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.257487 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.262226 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.262256 kernel: audit: type=1400 audit(1757726094.241:713): avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.241000 audit: BPF prog-id=115 op=LOAD Sep 13 01:14:54.265662 kernel: audit: type=1334 audit(1757726094.241:713): prog-id=115 op=LOAD Sep 13 01:14:54.241000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb37509f0 a2=98 a3=1fffffffffffffff items=0 ppid=3052 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.241000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:14:54.249000 audit: BPF prog-id=115 op=UNLOAD Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.249000 audit: BPF prog-id=116 op=LOAD Sep 13 01:14:54.249000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb37508d0 a2=94 a3=3 items=0 ppid=3052 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.249000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:14:54.256000 audit: BPF prog-id=116 op=UNLOAD Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.256000 audit: BPF prog-id=117 op=LOAD Sep 13 01:14:54.256000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb3750910 a2=94 a3=7ffeb3750af0 items=0 ppid=3052 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.256000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:14:54.263000 audit: BPF prog-id=117 op=UNLOAD Sep 13 01:14:54.263000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.263000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffeb37509e0 a2=50 a3=a000000085 items=0 ppid=3052 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.263000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit: BPF prog-id=118 op=LOAD Sep 13 01:14:54.266000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbe0fb470 a2=98 a3=3 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.266000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.266000 audit: BPF prog-id=118 op=UNLOAD Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.266000 audit: BPF prog-id=119 op=LOAD Sep 13 01:14:54.266000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdbe0fb260 a2=94 a3=54428f items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.266000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.267000 audit: BPF prog-id=119 op=UNLOAD Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.267000 audit: BPF prog-id=120 op=LOAD Sep 13 01:14:54.267000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdbe0fb290 a2=94 a3=2 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.267000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.267000 audit: BPF prog-id=120 op=UNLOAD Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit: BPF prog-id=121 op=LOAD Sep 13 01:14:54.340000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdbe0fb150 a2=94 a3=1 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.340000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.340000 audit: BPF prog-id=121 op=UNLOAD Sep 13 01:14:54.340000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.340000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdbe0fb220 a2=50 a3=7ffdbe0fb300 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.340000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.347000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.347000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbe0fb160 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.347000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbe0fb190 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbe0fb0a0 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbe0fb1b0 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbe0fb190 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbe0fb180 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbe0fb1b0 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbe0fb190 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbe0fb1b0 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.348000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.348000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbe0fb180 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.348000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbe0fb1f0 a2=28 a3=0 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdbe0fafa0 a2=50 a3=1 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit: BPF prog-id=122 op=LOAD Sep 13 01:14:54.349000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbe0fafa0 a2=94 a3=5 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.349000 audit: BPF prog-id=122 op=UNLOAD Sep 13 01:14:54.349000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.349000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdbe0fb050 a2=50 a3=1 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.349000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdbe0fb170 a2=4 a3=38 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.350000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.350000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdbe0fb1c0 a2=94 a3=6 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.350000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.350000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.350000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdbe0fa970 a2=94 a3=88 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.350000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.351000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.351000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdbe0fa970 a2=94 a3=88 items=0 ppid=3052 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.351000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit: BPF prog-id=123 op=LOAD Sep 13 01:14:54.352000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd437c8300 a2=98 a3=3 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.352000 audit: BPF prog-id=123 op=UNLOAD Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.352000 audit: BPF prog-id=124 op=LOAD Sep 13 01:14:54.352000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd437c80f0 a2=94 a3=54428f items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.353000 audit: BPF prog-id=124 op=UNLOAD Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.353000 audit: BPF prog-id=125 op=LOAD Sep 13 01:14:54.353000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd437c8120 a2=94 a3=2 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.353000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.353000 audit: BPF prog-id=125 op=UNLOAD Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit: BPF prog-id=126 op=LOAD Sep 13 01:14:54.423000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd437c7fe0 a2=94 a3=1 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.423000 audit: BPF prog-id=126 op=UNLOAD Sep 13 01:14:54.423000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.423000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd437c80b0 a2=50 a3=7ffd437c8190 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd437c7ff0 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd437c8020 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd437c7f30 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd437c8040 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd437c8020 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd437c8010 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd437c8040 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd437c8020 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd437c8040 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd437c8010 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd437c8080 a2=28 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd437c7e30 a2=50 a3=1 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit: BPF prog-id=127 op=LOAD Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd437c7e30 a2=94 a3=5 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit: BPF prog-id=127 op=UNLOAD Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd437c7ee0 a2=50 a3=1 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd437c8000 a2=4 a3=38 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd437c8050 a2=94 a3=6 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { confidentiality } for pid=3073 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd437c7800 a2=94 a3=88 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.430000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd437c7800 a2=94 a3=88 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=0 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=28 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=29 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=2a items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=2b items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=2c items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=2d items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=2e items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=2f items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=30 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=31 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=32 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=33 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=34 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.431000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.431000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=35 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=36 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=37 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=3a items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=3b items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=3e items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=44 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=4a items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=61 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=64 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=67 items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=6a items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=6b items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=6e items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.432000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.432000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd437c9230 a2=10 a3=6f items=0 ppid=3052 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.440000 audit: BPF prog-id=128 op=LOAD Sep 13 01:14:54.440000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff834ef4b0 a2=98 a3=1999999999999999 items=0 ppid=3052 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.440000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:14:54.441000 audit: BPF prog-id=128 op=UNLOAD Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit: BPF prog-id=129 op=LOAD Sep 13 01:14:54.441000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff834ef390 a2=94 a3=ffff items=0 ppid=3052 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.441000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:14:54.441000 audit: BPF prog-id=129 op=UNLOAD Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.441000 audit: BPF prog-id=130 op=LOAD Sep 13 01:14:54.441000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff834ef3d0 a2=94 a3=7fff834ef5b0 items=0 ppid=3052 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.441000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:14:54.442000 audit: BPF prog-id=130 op=UNLOAD Sep 13 01:14:54.519544 kubelet[1601]: E0913 01:14:54.519483 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.534000 audit: BPF prog-id=131 op=LOAD Sep 13 01:14:54.534000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeeb2edf20 a2=98 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.534000 audit: BPF prog-id=131 op=UNLOAD Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit: BPF prog-id=132 op=LOAD Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeeb2edd30 a2=94 a3=54428f items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit: BPF prog-id=132 op=UNLOAD Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit: BPF prog-id=133 op=LOAD Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeeb2edd60 a2=94 a3=2 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit: BPF prog-id=133 op=UNLOAD Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeeb2edc30 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeeb2edc60 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeeb2edb70 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeeb2edc80 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeeb2edc60 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeeb2edc50 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeeb2edc80 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeeb2edc60 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeeb2edc80 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeeb2edc50 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeeb2edcc0 a2=28 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.535000 audit: BPF prog-id=134 op=LOAD Sep 13 01:14:54.535000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeeb2edb30 a2=94 a3=0 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.535000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.535000 audit: BPF prog-id=134 op=UNLOAD Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffeeb2edb20 a2=50 a3=2800 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.536000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffeeb2edb20 a2=50 a3=2800 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.536000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit: BPF prog-id=135 op=LOAD Sep 13 01:14:54.536000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeeb2ed340 a2=94 a3=2 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.536000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.536000 audit: BPF prog-id=135 op=UNLOAD Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.536000 audit: BPF prog-id=136 op=LOAD Sep 13 01:14:54.536000 audit[3099]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeeb2ed440 a2=94 a3=30 items=0 ppid=3052 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.536000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit: BPF prog-id=137 op=LOAD Sep 13 01:14:54.540000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce2fbf100 a2=98 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.540000 audit: BPF prog-id=137 op=UNLOAD Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.540000 audit: BPF prog-id=138 op=LOAD Sep 13 01:14:54.540000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce2fbeef0 a2=94 a3=54428f items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.540000 audit: BPF prog-id=138 op=UNLOAD Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.541000 audit: BPF prog-id=139 op=LOAD Sep 13 01:14:54.541000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce2fbef20 a2=94 a3=2 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.541000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.541000 audit: BPF prog-id=139 op=UNLOAD Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.623000 audit: BPF prog-id=140 op=LOAD Sep 13 01:14:54.623000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce2fbede0 a2=94 a3=1 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.625000 audit: BPF prog-id=140 op=UNLOAD Sep 13 01:14:54.625000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.625000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffce2fbeeb0 a2=50 a3=7ffce2fbef90 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce2fbedf0 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce2fbee20 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce2fbed30 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce2fbee40 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce2fbee20 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce2fbee10 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce2fbee40 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce2fbee20 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce2fbee40 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce2fbee10 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce2fbee80 a2=28 a3=0 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffce2fbec30 a2=50 a3=1 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.640000 audit: BPF prog-id=141 op=LOAD Sep 13 01:14:54.640000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce2fbec30 a2=94 a3=5 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit: BPF prog-id=141 op=UNLOAD Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffce2fbece0 a2=50 a3=1 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffce2fbee00 a2=4 a3=38 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { confidentiality } for pid=3101 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffce2fbee50 a2=94 a3=6 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { confidentiality } for pid=3101 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffce2fbe600 a2=94 a3=88 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { confidentiality } for pid=3101 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffce2fbe600 a2=94 a3=88 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffce2fc0030 a2=10 a3=f8f00800 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffce2fbfed0 a2=10 a3=3 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffce2fbfe70 a2=10 a3=3 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.641000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:14:54.641000 audit[3101]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffce2fbfe70 a2=10 a3=7 items=0 ppid=3052 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:14:54.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:14:54.655000 audit: BPF prog-id=136 op=UNLOAD Sep 13 01:14:55.520202 kubelet[1601]: E0913 01:14:55.520171 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:56.520460 kubelet[1601]: E0913 01:14:56.520427 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:57.521365 kubelet[1601]: E0913 01:14:57.521342 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:58.522583 kubelet[1601]: E0913 01:14:58.522553 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:14:59.523263 kubelet[1601]: E0913 01:14:59.523207 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:00.524002 kubelet[1601]: E0913 01:15:00.523975 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:01.479753 env[1249]: time="2025-09-13T01:15:01.479686477Z" level=info msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\"" Sep 13 01:15:01.524439 kubelet[1601]: E0913 01:15:01.524400 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.539 [WARNING][3159] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-csi--node--driver--l9fgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e406acba-8d5c-4e8a-9e2a-233a32847dff", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 12, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e", Pod:"csi-node-driver-l9fgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali68ceb6206bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.539 [INFO][3159] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.539 [INFO][3159] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" iface="eth0" netns="" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.539 [INFO][3159] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.539 [INFO][3159] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.553 [INFO][3166] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.553 [INFO][3166] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.553 [INFO][3166] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.560 [WARNING][3166] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.560 [INFO][3166] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.561 [INFO][3166] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:15:01.563519 env[1249]: 2025-09-13 01:15:01.562 [INFO][3159] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.563901 env[1249]: time="2025-09-13T01:15:01.563879216Z" level=info msg="TearDown network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" successfully" Sep 13 01:15:01.563953 env[1249]: time="2025-09-13T01:15:01.563941182Z" level=info msg="StopPodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" returns successfully" Sep 13 01:15:01.564406 env[1249]: time="2025-09-13T01:15:01.564386780Z" level=info msg="RemovePodSandbox for \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\"" Sep 13 01:15:01.564444 env[1249]: time="2025-09-13T01:15:01.564408876Z" level=info msg="Forcibly stopping sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\"" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.585 [WARNING][3180] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-csi--node--driver--l9fgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e406acba-8d5c-4e8a-9e2a-233a32847dff", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 12, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"9355664bfe3a98d6a147d34514f1a97ffcb475fc444af7892d4fe9264e30b74e", Pod:"csi-node-driver-l9fgx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali68ceb6206bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.585 [INFO][3180] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.585 [INFO][3180] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" iface="eth0" netns="" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.585 [INFO][3180] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.585 [INFO][3180] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.598 [INFO][3187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.598 [INFO][3187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.598 [INFO][3187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.602 [WARNING][3187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.602 [INFO][3187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" HandleID="k8s-pod-network.d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Workload="10.67.124.133-k8s-csi--node--driver--l9fgx-eth0" Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.603 [INFO][3187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:15:01.605318 env[1249]: 2025-09-13 01:15:01.604 [INFO][3180] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb" Sep 13 01:15:01.605698 env[1249]: time="2025-09-13T01:15:01.605675845Z" level=info msg="TearDown network for sandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" successfully" Sep 13 01:15:01.606739 env[1249]: time="2025-09-13T01:15:01.606724941Z" level=info msg="RemovePodSandbox \"d19f9c90c1eeff445565325445007b13aed99173b3e01087dc35efd85ed784bb\" returns successfully" Sep 13 01:15:02.525199 kubelet[1601]: E0913 01:15:02.525147 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:03.525503 kubelet[1601]: E0913 01:15:03.525461 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:04.348395 kernel: kauditd_printk_skb: 742 callbacks suppressed Sep 13 01:15:04.348481 kernel: audit: type=1325 audit(1757726104.344:868): table=filter:73 family=2 entries=22 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.344000 audit[3197]: NETFILTER_CFG table=filter:73 family=2 entries=22 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.352489 kernel: audit: type=1300 audit(1757726104.344:868): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffc4afcfc40 a2=0 a3=7ffc4afcfc2c items=0 ppid=1824 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:04.344000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffc4afcfc40 a2=0 a3=7ffc4afcfc2c items=0 ppid=1824 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:04.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:04.354441 kernel: audit: type=1327 audit(1757726104.344:868): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:04.354000 audit[3197]: NETFILTER_CFG table=nat:74 family=2 entries=24 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.354000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffc4afcfc40 a2=0 a3=0 items=0 ppid=1824 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:04.361087 kernel: audit: type=1325 audit(1757726104.354:869): table=nat:74 family=2 entries=24 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.361138 kernel: audit: type=1300 audit(1757726104.354:869): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffc4afcfc40 a2=0 a3=0 items=0 ppid=1824 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:04.361160 kernel: audit: type=1327 audit(1757726104.354:869): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:04.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:04.365000 audit[3199]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.365000 audit[3199]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff260d3500 a2=0 a3=7fff260d34ec items=0 ppid=1824 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:04.372481 kernel: audit: type=1325 audit(1757726104.365:870): table=filter:75 family=2 entries=34 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.372509 kernel: audit: type=1300 audit(1757726104.365:870): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff260d3500 a2=0 a3=7fff260d34ec items=0 ppid=1824 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:04.372526 kernel: audit: type=1327 audit(1757726104.365:870): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:04.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:04.375000 audit[3199]: NETFILTER_CFG table=nat:76 family=2 entries=24 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.375000 audit[3199]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7fff260d3500 a2=0 a3=0 items=0 ppid=1824 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:04.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:04.379121 kernel: audit: type=1325 audit(1757726104.375:871): table=nat:76 family=2 entries=24 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:04.394464 kubelet[1601]: E0913 01:15:04.394444 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:04.526080 kubelet[1601]: E0913 01:15:04.526053 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:05.526639 kubelet[1601]: E0913 01:15:05.526613 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:06.527864 kubelet[1601]: E0913 01:15:06.527833 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:06.640355 kubelet[1601]: I0913 01:15:06.640315 1601 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-xp9zk" podStartSLOduration=140.307244601 podStartE2EDuration="2m23.640301616s" podCreationTimestamp="2025-09-13 01:12:43 +0000 UTC" firstStartedPulling="2025-09-13 01:12:44.372970438 +0000 UTC m=+40.320767410" lastFinishedPulling="2025-09-13 01:12:47.70602745 +0000 UTC m=+43.653824425" observedRunningTime="2025-09-13 01:12:48.649254695 +0000 UTC m=+44.597051684" watchObservedRunningTime="2025-09-13 01:15:06.640301616 +0000 UTC m=+182.588098604" Sep 13 01:15:07.528894 kubelet[1601]: E0913 01:15:07.528864 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:08.529515 kubelet[1601]: E0913 01:15:08.529483 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:09.519337 update_engine[1243]: I0913 01:15:09.519292 1243 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Sep 13 01:15:09.519337 update_engine[1243]: I0913 01:15:09.519337 1243 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Sep 13 01:15:09.520487 update_engine[1243]: I0913 01:15:09.520471 1243 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Sep 13 01:15:09.520963 update_engine[1243]: I0913 01:15:09.520947 1243 omaha_request_params.cc:62] Current group set to lts Sep 13 01:15:09.522968 update_engine[1243]: I0913 01:15:09.522951 1243 update_attempter.cc:499] Already updated boot flags. Skipping. Sep 13 01:15:09.522968 update_engine[1243]: I0913 01:15:09.522961 1243 update_attempter.cc:643] Scheduling an action processor start. Sep 13 01:15:09.523039 update_engine[1243]: I0913 01:15:09.522976 1243 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 13 01:15:09.523039 update_engine[1243]: I0913 01:15:09.522996 1243 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Sep 13 01:15:09.523562 update_engine[1243]: I0913 01:15:09.523037 1243 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 13 01:15:09.523562 update_engine[1243]: I0913 01:15:09.523042 1243 omaha_request_action.cc:271] Request: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: Sep 13 01:15:09.523562 update_engine[1243]: I0913 01:15:09.523053 1243 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 01:15:09.524782 locksmithd[1290]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Sep 13 01:15:09.529735 update_engine[1243]: I0913 01:15:09.529717 1243 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 01:15:09.529817 update_engine[1243]: E0913 01:15:09.529801 1243 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 01:15:09.529868 update_engine[1243]: I0913 01:15:09.529853 1243 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Sep 13 01:15:09.530104 kubelet[1601]: E0913 01:15:09.530084 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:10.530783 kubelet[1601]: E0913 01:15:10.530755 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:11.530852 kubelet[1601]: E0913 01:15:11.530811 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:12.531722 kubelet[1601]: E0913 01:15:12.531696 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:13.532936 kubelet[1601]: E0913 01:15:13.532901 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:14.533951 kubelet[1601]: E0913 01:15:14.533921 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:15.534022 kubelet[1601]: E0913 01:15:15.533988 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:16.534159 kubelet[1601]: E0913 01:15:16.534129 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:17.535264 kubelet[1601]: E0913 01:15:17.535204 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:18.536188 kubelet[1601]: E0913 01:15:18.536157 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:19.427865 update_engine[1243]: I0913 01:15:19.427824 1243 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 01:15:19.428154 update_engine[1243]: I0913 01:15:19.427995 1243 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 01:15:19.428154 update_engine[1243]: E0913 01:15:19.428061 1243 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 01:15:19.428154 update_engine[1243]: I0913 01:15:19.428128 1243 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Sep 13 01:15:19.536474 kubelet[1601]: E0913 01:15:19.536443 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:20.537501 kubelet[1601]: E0913 01:15:20.537444 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:21.538364 kubelet[1601]: E0913 01:15:21.538335 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:22.157599 systemd[1]: Created slice kubepods-besteffort-pod09076813_c7f8_4f3a_b59a_f752a77268f9.slice. Sep 13 01:15:22.200814 kubelet[1601]: I0913 01:15:22.200744 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/09076813-c7f8-4f3a-b59a-f752a77268f9-data\") pod \"nfs-server-provisioner-0\" (UID: \"09076813-c7f8-4f3a-b59a-f752a77268f9\") " pod="default/nfs-server-provisioner-0" Sep 13 01:15:22.200814 kubelet[1601]: I0913 01:15:22.200780 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bvqhf\" (UniqueName: \"kubernetes.io/projected/09076813-c7f8-4f3a-b59a-f752a77268f9-kube-api-access-bvqhf\") pod \"nfs-server-provisioner-0\" (UID: \"09076813-c7f8-4f3a-b59a-f752a77268f9\") " pod="default/nfs-server-provisioner-0" Sep 13 01:15:22.327000 audit[3241]: NETFILTER_CFG table=filter:77 family=2 entries=34 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.331795 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 01:15:22.331835 kernel: audit: type=1325 audit(1757726122.327:872): table=filter:77 family=2 entries=34 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.327000 audit[3241]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffdb42b10c0 a2=0 a3=7ffdb42b10ac items=0 ppid=1824 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.335764 kernel: audit: type=1300 audit(1757726122.327:872): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffdb42b10c0 a2=0 a3=7ffdb42b10ac items=0 ppid=1824 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:22.337642 kernel: audit: type=1327 audit(1757726122.327:872): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:22.337679 kernel: audit: type=1325 audit(1757726122.334:873): table=nat:78 family=2 entries=24 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.334000 audit[3241]: NETFILTER_CFG table=nat:78 family=2 entries=24 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.334000 audit[3241]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffdb42b10c0 a2=0 a3=0 items=0 ppid=1824 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.343366 kernel: audit: type=1300 audit(1757726122.334:873): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffdb42b10c0 a2=0 a3=0 items=0 ppid=1824 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:22.345380 kernel: audit: type=1327 audit(1757726122.334:873): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:22.346000 audit[3243]: NETFILTER_CFG table=filter:79 family=2 entries=33 op=nft_register_rule pid=3243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.346000 audit[3243]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd9a5cc2d0 a2=0 a3=7ffd9a5cc2bc items=0 ppid=1824 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.353817 kernel: audit: type=1325 audit(1757726122.346:874): table=filter:79 family=2 entries=33 op=nft_register_rule pid=3243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.353853 kernel: audit: type=1300 audit(1757726122.346:874): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd9a5cc2d0 a2=0 a3=7ffd9a5cc2bc items=0 ppid=1824 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.353870 kernel: audit: type=1327 audit(1757726122.346:874): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:22.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:22.355000 audit[3243]: NETFILTER_CFG table=nat:80 family=2 entries=31 op=nft_register_chain pid=3243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.355000 audit[3243]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffd9a5cc2d0 a2=0 a3=7ffd9a5cc2bc items=0 ppid=1824 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:22.359124 kernel: audit: type=1325 audit(1757726122.355:875): table=nat:80 family=2 entries=31 op=nft_register_chain pid=3243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:22.460414 env[1249]: time="2025-09-13T01:15:22.460339899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:09076813-c7f8-4f3a-b59a-f752a77268f9,Namespace:default,Attempt:0,}" Sep 13 01:15:22.538500 kubelet[1601]: E0913 01:15:22.538457 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:22.597086 systemd-networkd[1063]: cali60e51b789ff: Link UP Sep 13 01:15:22.600004 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:15:22.600039 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 01:15:22.600105 systemd-networkd[1063]: cali60e51b789ff: Gained carrier Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.498 [INFO][3245] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.133-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 09076813-c7f8-4f3a-b59a-f752a77268f9 1460 0 2025-09-13 01:15:21 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.133 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.499 [INFO][3245] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.523 [INFO][3257] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" HandleID="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Workload="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.523 [INFO][3257] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" HandleID="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Workload="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002516a0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.133", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 01:15:22.523231404 +0000 UTC"}, Hostname:"10.67.124.133", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.523 [INFO][3257] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.523 [INFO][3257] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.523 [INFO][3257] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.133' Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.528 [INFO][3257] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.544 [INFO][3257] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.546 [INFO][3257] ipam/ipam.go 511: Trying affinity for 192.168.66.64/26 host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.548 [INFO][3257] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.549 [INFO][3257] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.549 [INFO][3257] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.550 [INFO][3257] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.572 [INFO][3257] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.592 [INFO][3257] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.67/26] block=192.168.66.64/26 handle="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.592 [INFO][3257] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.67/26] handle="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" host="10.67.124.133" Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.593 [INFO][3257] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:15:22.608612 env[1249]: 2025-09-13 01:15:22.593 [INFO][3257] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.67/26] IPv6=[] ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" HandleID="k8s-pod-network.6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Workload="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:15:22.609160 env[1249]: 2025-09-13 01:15:22.594 [INFO][3245] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"09076813-c7f8-4f3a-b59a-f752a77268f9", ResourceVersion:"1460", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 15, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:15:22.609160 env[1249]: 2025-09-13 01:15:22.594 [INFO][3245] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.67/32] ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:15:22.609160 env[1249]: 2025-09-13 01:15:22.594 [INFO][3245] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:15:22.609160 env[1249]: 2025-09-13 01:15:22.600 [INFO][3245] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:15:22.609283 env[1249]: 2025-09-13 01:15:22.601 [INFO][3245] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"09076813-c7f8-4f3a-b59a-f752a77268f9", ResourceVersion:"1460", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 15, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"2a:5b:9b:a4:7b:14", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:15:22.609283 env[1249]: 2025-09-13 01:15:22.606 [INFO][3245] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.133-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:15:22.615946 env[1249]: time="2025-09-13T01:15:22.615886346Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:15:22.616037 env[1249]: time="2025-09-13T01:15:22.615946766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:15:22.616037 env[1249]: time="2025-09-13T01:15:22.615964133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:15:22.616185 env[1249]: time="2025-09-13T01:15:22.616122378Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c pid=3279 runtime=io.containerd.runc.v2 Sep 13 01:15:22.628728 systemd[1]: Started cri-containerd-6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c.scope. Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit: BPF prog-id=142 op=LOAD Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3279 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353039326136656536383766623234383161303866313565636630 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3279 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353039326136656536383766623234383161303866313565636630 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit: BPF prog-id=143 op=LOAD Sep 13 01:15:22.638000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a78a0 items=0 ppid=3279 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353039326136656536383766623234383161303866313565636630 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.638000 audit: BPF prog-id=144 op=LOAD Sep 13 01:15:22.638000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a78e8 items=0 ppid=3279 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353039326136656536383766623234383161303866313565636630 Sep 13 01:15:22.638000 audit: BPF prog-id=144 op=UNLOAD Sep 13 01:15:22.638000 audit: BPF prog-id=143 op=UNLOAD Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:22.639000 audit: BPF prog-id=145 op=LOAD Sep 13 01:15:22.639000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a7cf8 items=0 ppid=3279 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353039326136656536383766623234383161303866313565636630 Sep 13 01:15:22.642440 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 01:15:22.654000 audit[3308]: NETFILTER_CFG table=filter:81 family=2 entries=46 op=nft_register_chain pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:15:22.654000 audit[3308]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7ffc1d3fa070 a2=0 a3=7ffc1d3fa05c items=0 ppid=3052 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:22.654000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:15:22.662258 env[1249]: time="2025-09-13T01:15:22.662232172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:09076813-c7f8-4f3a-b59a-f752a77268f9,Namespace:default,Attempt:0,} returns sandbox id \"6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c\"" Sep 13 01:15:22.663418 env[1249]: time="2025-09-13T01:15:22.663405127Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 01:15:23.311668 systemd[1]: run-containerd-runc-k8s.io-6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c-runc.SsyRNT.mount: Deactivated successfully. Sep 13 01:15:23.539265 kubelet[1601]: E0913 01:15:23.539220 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:24.395011 kubelet[1601]: E0913 01:15:24.394973 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:24.407475 systemd-networkd[1063]: cali60e51b789ff: Gained IPv6LL Sep 13 01:15:24.540006 kubelet[1601]: E0913 01:15:24.539980 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:24.659733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2569289103.mount: Deactivated successfully. Sep 13 01:15:25.540513 kubelet[1601]: E0913 01:15:25.540483 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:26.394012 env[1249]: time="2025-09-13T01:15:26.393978024Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:26.395052 env[1249]: time="2025-09-13T01:15:26.395029853Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:26.396363 env[1249]: time="2025-09-13T01:15:26.396343001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:26.397569 env[1249]: time="2025-09-13T01:15:26.397551711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:26.398218 env[1249]: time="2025-09-13T01:15:26.398195408Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 13 01:15:26.400376 env[1249]: time="2025-09-13T01:15:26.400358317Z" level=info msg="CreateContainer within sandbox \"6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 01:15:26.406332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1397369447.mount: Deactivated successfully. Sep 13 01:15:26.409562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1097717518.mount: Deactivated successfully. Sep 13 01:15:26.419333 env[1249]: time="2025-09-13T01:15:26.419305517Z" level=info msg="CreateContainer within sandbox \"6f5092a6ee687fb2481a08f15ecf070677ad1bad0406b7b855bd4839146ccc9c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"af4ea3174843cefaa249847c2f3e622f2f71637c3f24ad172d92fbfb010d7e0d\"" Sep 13 01:15:26.419619 env[1249]: time="2025-09-13T01:15:26.419606073Z" level=info msg="StartContainer for \"af4ea3174843cefaa249847c2f3e622f2f71637c3f24ad172d92fbfb010d7e0d\"" Sep 13 01:15:26.433313 systemd[1]: Started cri-containerd-af4ea3174843cefaa249847c2f3e622f2f71637c3f24ad172d92fbfb010d7e0d.scope. Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit: BPF prog-id=146 op=LOAD Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3279 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:26.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346561333137343834336365666161323439383437633266336536 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3279 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:26.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346561333137343834336365666161323439383437633266336536 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit: BPF prog-id=147 op=LOAD Sep 13 01:15:26.447000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024da0 items=0 ppid=3279 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:26.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346561333137343834336365666161323439383437633266336536 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit: BPF prog-id=148 op=LOAD Sep 13 01:15:26.447000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024de8 items=0 ppid=3279 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:26.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346561333137343834336365666161323439383437633266336536 Sep 13 01:15:26.447000 audit: BPF prog-id=148 op=UNLOAD Sep 13 01:15:26.447000 audit: BPF prog-id=147 op=UNLOAD Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:26.447000 audit: BPF prog-id=149 op=LOAD Sep 13 01:15:26.447000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000251f8 items=0 ppid=3279 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:26.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346561333137343834336365666161323439383437633266336536 Sep 13 01:15:26.461348 env[1249]: time="2025-09-13T01:15:26.461318942Z" level=info msg="StartContainer for \"af4ea3174843cefaa249847c2f3e622f2f71637c3f24ad172d92fbfb010d7e0d\" returns successfully" Sep 13 01:15:26.484000 audit[3350]: AVC avc: denied { search } for pid=3350 comm="rpcbind" name="crypto" dev="proc" ino=36293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:15:26.484000 audit[3350]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f7c6c5900c0 a2=0 a3=0 items=0 ppid=3333 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 key=(null) Sep 13 01:15:26.484000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 01:15:26.505000 audit[3355]: AVC avc: denied { search } for pid=3355 comm="dbus-daemon" name="crypto" dev="proc" ino=36293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:15:26.505000 audit[3355]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0f5dd760c0 a2=0 a3=0 items=0 ppid=3333 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 key=(null) Sep 13 01:15:26.505000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:15:26.507000 audit[3356]: AVC avc: denied { watch } for pid=3356 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=531251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c362,c528 tclass=dir permissive=0 Sep 13 01:15:26.507000 audit[3356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=557021874ca0 a2=2c8 a3=7ffe7a78122c items=0 ppid=3333 pid=3356 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 key=(null) Sep 13 01:15:26.507000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:15:26.509000 audit[3357]: AVC avc: denied { read } for pid=3357 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=36319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 01:15:26.509000 audit[3357]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f6f124e2320 a1=80000 a2=d a3=7fff9f912bd0 items=0 ppid=3333 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 key=(null) Sep 13 01:15:26.509000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:15:26.510000 audit[3357]: AVC avc: denied { search } for pid=3357 comm="ganesha.nfsd" name="crypto" dev="proc" ino=36293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:15:26.510000 audit[3357]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6f11a360c0 a2=0 a3=0 items=0 ppid=3333 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c528 key=(null) Sep 13 01:15:26.510000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:15:26.540671 kubelet[1601]: E0913 01:15:26.540640 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:26.849743 kubelet[1601]: I0913 01:15:26.849658 1601 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.113430665 podStartE2EDuration="5.849646569s" podCreationTimestamp="2025-09-13 01:15:21 +0000 UTC" firstStartedPulling="2025-09-13 01:15:22.663007494 +0000 UTC m=+198.610804465" lastFinishedPulling="2025-09-13 01:15:26.399223395 +0000 UTC m=+202.347020369" observedRunningTime="2025-09-13 01:15:26.849565059 +0000 UTC m=+202.797362042" watchObservedRunningTime="2025-09-13 01:15:26.849646569 +0000 UTC m=+202.797443548" Sep 13 01:15:27.092000 audit[3378]: NETFILTER_CFG table=filter:82 family=2 entries=20 op=nft_register_rule pid=3378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:27.092000 audit[3378]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe70cff270 a2=0 a3=7ffe70cff25c items=0 ppid=1824 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:27.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:27.102000 audit[3378]: NETFILTER_CFG table=nat:83 family=2 entries=110 op=nft_register_chain pid=3378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:15:27.102000 audit[3378]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffe70cff270 a2=0 a3=7ffe70cff25c items=0 ppid=1824 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:27.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:15:27.541414 kubelet[1601]: E0913 01:15:27.541384 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:28.541641 kubelet[1601]: E0913 01:15:28.541621 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:29.426804 update_engine[1243]: I0913 01:15:29.426759 1243 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 01:15:29.427034 update_engine[1243]: I0913 01:15:29.426959 1243 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 01:15:29.427070 update_engine[1243]: E0913 01:15:29.427038 1243 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 01:15:29.427099 update_engine[1243]: I0913 01:15:29.427090 1243 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Sep 13 01:15:29.542772 kubelet[1601]: E0913 01:15:29.542735 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:30.543053 kubelet[1601]: E0913 01:15:30.543036 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:31.543739 kubelet[1601]: E0913 01:15:31.543708 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:32.544037 kubelet[1601]: E0913 01:15:32.543991 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:33.544256 kubelet[1601]: E0913 01:15:33.544233 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:34.544746 kubelet[1601]: E0913 01:15:34.544709 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:35.545362 kubelet[1601]: E0913 01:15:35.545334 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:36.546281 kubelet[1601]: E0913 01:15:36.546262 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:37.547209 kubelet[1601]: E0913 01:15:37.547186 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:38.547686 kubelet[1601]: E0913 01:15:38.547664 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:39.427681 update_engine[1243]: I0913 01:15:39.427639 1243 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 01:15:39.427921 update_engine[1243]: I0913 01:15:39.427798 1243 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 01:15:39.427921 update_engine[1243]: E0913 01:15:39.427856 1243 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 01:15:39.427921 update_engine[1243]: I0913 01:15:39.427896 1243 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 13 01:15:39.427921 update_engine[1243]: I0913 01:15:39.427899 1243 omaha_request_action.cc:621] Omaha request response: Sep 13 01:15:39.428035 update_engine[1243]: E0913 01:15:39.427943 1243 omaha_request_action.cc:640] Omaha request network transfer failed. Sep 13 01:15:39.428035 update_engine[1243]: I0913 01:15:39.427959 1243 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Sep 13 01:15:39.428035 update_engine[1243]: I0913 01:15:39.427963 1243 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 01:15:39.428035 update_engine[1243]: I0913 01:15:39.427964 1243 update_attempter.cc:306] Processing Done. Sep 13 01:15:39.428035 update_engine[1243]: E0913 01:15:39.427974 1243 update_attempter.cc:619] Update failed. Sep 13 01:15:39.428035 update_engine[1243]: I0913 01:15:39.427979 1243 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Sep 13 01:15:39.428035 update_engine[1243]: I0913 01:15:39.427983 1243 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Sep 13 01:15:39.428035 update_engine[1243]: I0913 01:15:39.427987 1243 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Sep 13 01:15:39.428035 update_engine[1243]: I0913 01:15:39.428033 1243 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428050 1243 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428053 1243 omaha_request_action.cc:271] Request: Sep 13 01:15:39.428345 update_engine[1243]: Sep 13 01:15:39.428345 update_engine[1243]: Sep 13 01:15:39.428345 update_engine[1243]: Sep 13 01:15:39.428345 update_engine[1243]: Sep 13 01:15:39.428345 update_engine[1243]: Sep 13 01:15:39.428345 update_engine[1243]: Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428056 1243 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428138 1243 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 01:15:39.428345 update_engine[1243]: E0913 01:15:39.428179 1243 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428206 1243 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428220 1243 omaha_request_action.cc:621] Omaha request response: Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428223 1243 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428227 1243 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428229 1243 update_attempter.cc:306] Processing Done. Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428233 1243 update_attempter.cc:310] Error event sent. Sep 13 01:15:39.428345 update_engine[1243]: I0913 01:15:39.428241 1243 update_check_scheduler.cc:74] Next update check in 42m36s Sep 13 01:15:39.428646 locksmithd[1290]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Sep 13 01:15:39.428925 locksmithd[1290]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Sep 13 01:15:39.548562 kubelet[1601]: E0913 01:15:39.548538 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:40.549104 kubelet[1601]: E0913 01:15:40.549046 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:40.697938 systemd[1]: Created slice kubepods-besteffort-pod508c2948_2ef9_4022_a399_ef09352723a3.slice. Sep 13 01:15:40.899208 kubelet[1601]: I0913 01:15:40.898922 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qlpwx\" (UniqueName: \"kubernetes.io/projected/508c2948-2ef9-4022-a399-ef09352723a3-kube-api-access-qlpwx\") pod \"test-pod-1\" (UID: \"508c2948-2ef9-4022-a399-ef09352723a3\") " pod="default/test-pod-1" Sep 13 01:15:40.899406 kubelet[1601]: I0913 01:15:40.899387 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-64cc48bc-8c95-4569-88a4-14ea696bd9c2\" (UniqueName: \"kubernetes.io/nfs/508c2948-2ef9-4022-a399-ef09352723a3-pvc-64cc48bc-8c95-4569-88a4-14ea696bd9c2\") pod \"test-pod-1\" (UID: \"508c2948-2ef9-4022-a399-ef09352723a3\") " pod="default/test-pod-1" Sep 13 01:15:41.062272 kernel: Failed to create system directory netfs Sep 13 01:15:41.062348 kernel: kauditd_printk_skb: 140 callbacks suppressed Sep 13 01:15:41.062365 kernel: audit: type=1400 audit(1757726141.051:920): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.062382 kernel: Failed to create system directory netfs Sep 13 01:15:41.062399 kernel: audit: type=1400 audit(1757726141.051:920): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.062414 kernel: Failed to create system directory netfs Sep 13 01:15:41.062427 kernel: audit: type=1400 audit(1757726141.051:920): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.062439 kernel: Failed to create system directory netfs Sep 13 01:15:41.051000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.068288 kernel: audit: type=1400 audit(1757726141.051:920): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.051000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.051000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.051000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.070514 kernel: audit: type=1300 audit(1757726141.051:920): arch=c000003e syscall=175 success=yes exit=0 a0=55a5d7ad05e0 a1=153bc a2=55a59d7922b0 a3=5 items=0 ppid=9 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.051000 audit[3396]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a5d7ad05e0 a1=153bc a2=55a59d7922b0 a3=5 items=0 ppid=9 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.051000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:15:41.075122 kernel: audit: type=1327 audit(1757726141.051:920): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:15:41.081892 kernel: Failed to create system directory fscache Sep 13 01:15:41.081943 kernel: audit: type=1400 audit(1757726141.075:921): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.081960 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.085140 kernel: audit: type=1400 audit(1757726141.075:921): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.085167 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.088389 kernel: audit: type=1400 audit(1757726141.075:921): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.088416 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.091637 kernel: audit: type=1400 audit(1757726141.075:921): avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.091663 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.093489 kernel: Failed to create system directory fscache Sep 13 01:15:41.093515 kernel: Failed to create system directory fscache Sep 13 01:15:41.093529 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.094898 kernel: Failed to create system directory fscache Sep 13 01:15:41.094920 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.096684 kernel: Failed to create system directory fscache Sep 13 01:15:41.096709 kernel: Failed to create system directory fscache Sep 13 01:15:41.096724 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.075000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.098128 kernel: Failed to create system directory fscache Sep 13 01:15:41.075000 audit[3396]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a5d7ce59c0 a1=4c0fc a2=55a59d7922b0 a3=5 items=0 ppid=9 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.075000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:15:41.100123 kernel: FS-Cache: Loaded Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.130704 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.130752 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.130774 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.132565 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.132588 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.132602 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.134399 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.134431 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.134446 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.135617 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.135645 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.137477 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.137504 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.137517 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.138130 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.139467 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.139487 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.140550 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.141191 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.141218 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.143448 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.143470 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.143484 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.144337 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.144364 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.145591 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.145611 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.147394 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.147415 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.147446 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.148667 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.148693 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.150124 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.153713 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.153745 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.153760 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.153773 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.154604 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.155671 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.155703 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.156314 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.157512 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.157539 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.158342 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.159458 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.159760 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.160680 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.160717 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.162553 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.162589 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.162604 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.164483 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.164509 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.164523 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.165718 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.165751 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.167562 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.167593 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.167607 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.169418 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.169444 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.169458 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.170737 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.170776 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.171624 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.172710 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.172739 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.174615 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.174650 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.174663 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.175248 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.176456 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.176540 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.177757 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.177791 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.179601 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.179630 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.179645 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.181509 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.181531 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.181545 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.182133 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.184395 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.185291 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.185310 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.185323 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.186700 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.186723 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.186737 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.187483 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.188535 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.188566 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.190370 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.190398 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.190412 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.191603 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.191633 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.193441 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.193471 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.193486 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.194659 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.194698 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.196489 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.196518 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.196535 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.197709 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.197736 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.199553 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.199578 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.199595 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.201423 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.201454 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.201470 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.202631 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.202658 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.204514 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.204545 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.204559 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.206344 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.206374 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.206388 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.207565 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.207591 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.209408 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.209436 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.209453 kernel: Failed to create system directory sunrpc Sep 13 01:15:41.119000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.216247 kernel: RPC: Registered named UNIX socket transport module. Sep 13 01:15:41.216279 kernel: RPC: Registered udp transport module. Sep 13 01:15:41.216296 kernel: RPC: Registered tcp transport module. Sep 13 01:15:41.217574 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 01:15:41.119000 audit[3396]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a5d7d31ad0 a1=1a8274 a2=55a59d7922b0 a3=5 items=6 ppid=9 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.119000 audit: CWD cwd="/" Sep 13 01:15:41.119000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:15:41.119000 audit: PATH item=1 name=(null) inode=36537 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:15:41.119000 audit: PATH item=2 name=(null) inode=36537 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:15:41.119000 audit: PATH item=3 name=(null) inode=36538 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:15:41.119000 audit: PATH item=4 name=(null) inode=36537 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:15:41.119000 audit: PATH item=5 name=(null) inode=36539 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:15:41.119000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.307431 kernel: Failed to create system directory nfs Sep 13 01:15:41.307472 kernel: Failed to create system directory nfs Sep 13 01:15:41.307485 kernel: Failed to create system directory nfs Sep 13 01:15:41.307498 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.308578 kernel: Failed to create system directory nfs Sep 13 01:15:41.308609 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.310295 kernel: Failed to create system directory nfs Sep 13 01:15:41.310327 kernel: Failed to create system directory nfs Sep 13 01:15:41.310340 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.311448 kernel: Failed to create system directory nfs Sep 13 01:15:41.311479 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.312615 kernel: Failed to create system directory nfs Sep 13 01:15:41.312639 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.314346 kernel: Failed to create system directory nfs Sep 13 01:15:41.314372 kernel: Failed to create system directory nfs Sep 13 01:15:41.314386 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.315491 kernel: Failed to create system directory nfs Sep 13 01:15:41.315516 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.316619 kernel: Failed to create system directory nfs Sep 13 01:15:41.316644 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.317211 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.318352 kernel: Failed to create system directory nfs Sep 13 01:15:41.318376 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.319499 kernel: Failed to create system directory nfs Sep 13 01:15:41.319523 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.320641 kernel: Failed to create system directory nfs Sep 13 01:15:41.320666 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.322367 kernel: Failed to create system directory nfs Sep 13 01:15:41.322393 kernel: Failed to create system directory nfs Sep 13 01:15:41.322406 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.323509 kernel: Failed to create system directory nfs Sep 13 01:15:41.323533 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.324652 kernel: Failed to create system directory nfs Sep 13 01:15:41.324677 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.326380 kernel: Failed to create system directory nfs Sep 13 01:15:41.326400 kernel: Failed to create system directory nfs Sep 13 01:15:41.326412 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.327524 kernel: Failed to create system directory nfs Sep 13 01:15:41.327550 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.328666 kernel: Failed to create system directory nfs Sep 13 01:15:41.328692 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.329245 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.330400 kernel: Failed to create system directory nfs Sep 13 01:15:41.330425 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.331688 kernel: Failed to create system directory nfs Sep 13 01:15:41.331709 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.332269 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.333429 kernel: Failed to create system directory nfs Sep 13 01:15:41.333453 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.334681 kernel: Failed to create system directory nfs Sep 13 01:15:41.334707 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.336313 kernel: Failed to create system directory nfs Sep 13 01:15:41.336337 kernel: Failed to create system directory nfs Sep 13 01:15:41.336352 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.337459 kernel: Failed to create system directory nfs Sep 13 01:15:41.337485 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.338610 kernel: Failed to create system directory nfs Sep 13 01:15:41.338630 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.297000 audit[3396]: AVC avc: denied { confidentiality } for pid=3396 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.340360 kernel: Failed to create system directory nfs Sep 13 01:15:41.340463 kernel: Failed to create system directory nfs Sep 13 01:15:41.297000 audit[3396]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a5d7f52c10 a1=16eb2c a2=55a59d7922b0 a3=5 items=0 ppid=9 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.297000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:15:41.354127 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.406165 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.406202 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.407489 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.407510 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.408153 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420887 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420910 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420923 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420936 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420947 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420959 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420972 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420983 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.420997 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421009 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421021 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421033 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421045 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421057 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421069 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421083 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421096 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421120 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421142 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421154 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.421168 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.423509 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.423534 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.423548 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.424202 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.425681 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.425707 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.426358 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.427663 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.427719 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.428374 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.429679 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.429704 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.430358 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.431178 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.432402 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.432428 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.432441 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.433598 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.433623 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.435402 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.435421 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.435440 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.436617 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.437247 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.437275 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.438609 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.439289 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.439319 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.440501 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.441127 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.441160 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.442351 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.442387 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.443560 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.443596 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.445382 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.446129 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.446151 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.446164 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.447233 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.447267 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.448441 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.448471 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.449608 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.449638 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.451466 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.451496 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.451510 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.452662 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.452693 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.454471 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.454500 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.454517 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.455645 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.455672 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.457489 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.457517 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.457530 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.459323 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.459355 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.459371 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.460527 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.460560 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.462325 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.462353 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.462369 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.463519 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.463548 kernel: Failed to create system directory nfs4 Sep 13 01:15:41.394000 audit[3401]: AVC avc: denied { confidentiality } for pid=3401 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.549327 kubelet[1601]: E0913 01:15:41.549303 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:41.553398 kernel: NFS: Registering the id_resolver key type Sep 13 01:15:41.553442 kernel: Key type id_resolver registered Sep 13 01:15:41.553458 kernel: Key type id_legacy registered Sep 13 01:15:41.394000 audit[3401]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8f02d45010 a1=2095c4 a2=5624b1be82b0 a3=5 items=0 ppid=9 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.394000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.569153 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.569190 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.570502 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.570528 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.571200 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.572509 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.572536 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.573199 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.574530 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.574552 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.575216 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.576537 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.576561 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.577223 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.578538 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.578563 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.579227 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.580541 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.580566 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.581228 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.582550 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.582575 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.583238 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.584555 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.584580 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.585267 kernel: Failed to create system directory rpcgss Sep 13 01:15:41.564000 audit[3402]: AVC avc: denied { confidentiality } for pid=3402 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:15:41.564000 audit[3402]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f0d9db0f010 a1=70bf4 a2=55b209eed2b0 a3=5 items=0 ppid=9 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.564000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 01:15:41.626558 nfsidmap[3410]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 13 01:15:41.630787 nfsidmap[3413]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 13 01:15:41.637000 audit[1365]: AVC avc: denied { watch_reads } for pid=1365 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2581 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:15:41.637000 audit[1365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f3289f6600 a2=10 a3=904eea8063b4149c items=0 ppid=1 pid=1365 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.637000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:15:41.637000 audit[1365]: AVC avc: denied { watch_reads } for pid=1365 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2581 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:15:41.637000 audit[1365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f3289f6600 a2=10 a3=904eea8063b4149c items=0 ppid=1 pid=1365 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:41.637000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:15:41.637000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2581 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:15:41.637000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2581 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:15:41.637000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2581 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:15:41.900567 env[1249]: time="2025-09-13T01:15:41.900518410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:508c2948-2ef9-4022-a399-ef09352723a3,Namespace:default,Attempt:0,}" Sep 13 01:15:42.550435 kubelet[1601]: E0913 01:15:42.550406 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:42.919029 systemd-networkd[1063]: cali5ec59c6bf6e: Link UP Sep 13 01:15:42.924501 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:15:42.924564 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 01:15:42.921559 systemd-networkd[1063]: cali5ec59c6bf6e: Gained carrier Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.636 [INFO][3415] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.133-k8s-test--pod--1-eth0 default 508c2948-2ef9-4022-a399-ef09352723a3 1524 0 2025-09-13 01:15:05 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.133 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.636 [INFO][3415] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-eth0" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.661 [INFO][3427] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" HandleID="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Workload="10.67.124.133-k8s-test--pod--1-eth0" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.662 [INFO][3427] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" HandleID="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Workload="10.67.124.133-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5960), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.133", "pod":"test-pod-1", "timestamp":"2025-09-13 01:15:42.661770177 +0000 UTC"}, Hostname:"10.67.124.133", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.662 [INFO][3427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.662 [INFO][3427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.662 [INFO][3427] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.133' Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.864 [INFO][3427] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.871 [INFO][3427] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.876 [INFO][3427] ipam/ipam.go 511: Trying affinity for 192.168.66.64/26 host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.877 [INFO][3427] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.879 [INFO][3427] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.879 [INFO][3427] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.883 [INFO][3427] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40 Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.901 [INFO][3427] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.915 [INFO][3427] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.68/26] block=192.168.66.64/26 handle="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.915 [INFO][3427] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.68/26] handle="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" host="10.67.124.133" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.915 [INFO][3427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.915 [INFO][3427] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.68/26] IPv6=[] ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" HandleID="k8s-pod-network.60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Workload="10.67.124.133-k8s-test--pod--1-eth0" Sep 13 01:15:43.043363 env[1249]: 2025-09-13 01:15:42.916 [INFO][3415] cni-plugin/k8s.go 418: Populated endpoint ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"508c2948-2ef9-4022-a399-ef09352723a3", ResourceVersion:"1524", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:15:43.044001 env[1249]: 2025-09-13 01:15:42.916 [INFO][3415] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.68/32] ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-eth0" Sep 13 01:15:43.044001 env[1249]: 2025-09-13 01:15:42.916 [INFO][3415] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-eth0" Sep 13 01:15:43.044001 env[1249]: 2025-09-13 01:15:42.925 [INFO][3415] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-eth0" Sep 13 01:15:43.044001 env[1249]: 2025-09-13 01:15:42.929 [INFO][3415] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.133-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"508c2948-2ef9-4022-a399-ef09352723a3", ResourceVersion:"1524", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.133", ContainerID:"60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0e:a3:9a:2b:e8:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:15:43.044001 env[1249]: 2025-09-13 01:15:43.042 [INFO][3415] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.133-k8s-test--pod--1-eth0" Sep 13 01:15:43.053789 env[1249]: time="2025-09-13T01:15:43.053741040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:15:43.053913 env[1249]: time="2025-09-13T01:15:43.053888316Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:15:43.053983 env[1249]: time="2025-09-13T01:15:43.053904143Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:15:43.054171 env[1249]: time="2025-09-13T01:15:43.054144113Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40 pid=3449 runtime=io.containerd.runc.v2 Sep 13 01:15:43.063161 systemd[1]: Started cri-containerd-60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40.scope. Sep 13 01:15:43.065966 systemd[1]: run-containerd-runc-k8s.io-60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40-runc.Ty2aTT.mount: Deactivated successfully. Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.074000 audit: BPF prog-id=150 op=LOAD Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3449 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626438633361613330616535396365376332323961306564323030 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3449 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626438633361613330616535396365376332323961306564323030 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.075000 audit: BPF prog-id=151 op=LOAD Sep 13 01:15:43.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c81d0 items=0 ppid=3449 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626438633361613330616535396365376332323961306564323030 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit: BPF prog-id=152 op=LOAD Sep 13 01:15:43.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c8218 items=0 ppid=3449 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626438633361613330616535396365376332323961306564323030 Sep 13 01:15:43.076000 audit: BPF prog-id=152 op=UNLOAD Sep 13 01:15:43.076000 audit: BPF prog-id=151 op=UNLOAD Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.076000 audit: BPF prog-id=153 op=LOAD Sep 13 01:15:43.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c8628 items=0 ppid=3449 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630626438633361613330616535396365376332323961306564323030 Sep 13 01:15:43.078564 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 01:15:43.097985 env[1249]: time="2025-09-13T01:15:43.097952979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:508c2948-2ef9-4022-a399-ef09352723a3,Namespace:default,Attempt:0,} returns sandbox id \"60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40\"" Sep 13 01:15:43.099211 env[1249]: time="2025-09-13T01:15:43.099196751Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:15:43.218000 audit[3486]: NETFILTER_CFG table=filter:84 family=2 entries=36 op=nft_register_chain pid=3486 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:15:43.218000 audit[3486]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffdb5d464d0 a2=0 a3=7ffdb5d464bc items=0 ppid=3052 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.218000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:15:43.465554 env[1249]: time="2025-09-13T01:15:43.465507166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:43.466798 env[1249]: time="2025-09-13T01:15:43.466770972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:43.470431 env[1249]: time="2025-09-13T01:15:43.470412547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:43.471497 env[1249]: time="2025-09-13T01:15:43.471448582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:15:43.472049 env[1249]: time="2025-09-13T01:15:43.472030584Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 01:15:43.473696 env[1249]: time="2025-09-13T01:15:43.473677859Z" level=info msg="CreateContainer within sandbox \"60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 01:15:43.478705 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3565087581.mount: Deactivated successfully. Sep 13 01:15:43.481520 env[1249]: time="2025-09-13T01:15:43.481496004Z" level=info msg="CreateContainer within sandbox \"60bd8c3aa30ae59ce7c229a0ed200db9c1a5d6af77a58d7397dc310ff06ccf40\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"31cc79c999def8f15b2979ab3e7f6d338c2dc7bc051f439efc9750e8bf9e6de0\"" Sep 13 01:15:43.481789 env[1249]: time="2025-09-13T01:15:43.481775268Z" level=info msg="StartContainer for \"31cc79c999def8f15b2979ab3e7f6d338c2dc7bc051f439efc9750e8bf9e6de0\"" Sep 13 01:15:43.491258 systemd[1]: Started cri-containerd-31cc79c999def8f15b2979ab3e7f6d338c2dc7bc051f439efc9750e8bf9e6de0.scope. Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.499000 audit: BPF prog-id=154 op=LOAD Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3449 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636337396339393964656638663135623239373961623365376636 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3449 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636337396339393964656638663135623239373961623365376636 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit: BPF prog-id=155 op=LOAD Sep 13 01:15:43.500000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030a370 items=0 ppid=3449 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636337396339393964656638663135623239373961623365376636 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit: BPF prog-id=156 op=LOAD Sep 13 01:15:43.500000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030a3b8 items=0 ppid=3449 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636337396339393964656638663135623239373961623365376636 Sep 13 01:15:43.500000 audit: BPF prog-id=156 op=UNLOAD Sep 13 01:15:43.500000 audit: BPF prog-id=155 op=UNLOAD Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:15:43.500000 audit: BPF prog-id=157 op=LOAD Sep 13 01:15:43.500000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030a7c8 items=0 ppid=3449 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:15:43.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636337396339393964656638663135623239373961623365376636 Sep 13 01:15:43.510234 env[1249]: time="2025-09-13T01:15:43.510202169Z" level=info msg="StartContainer for \"31cc79c999def8f15b2979ab3e7f6d338c2dc7bc051f439efc9750e8bf9e6de0\" returns successfully" Sep 13 01:15:43.551239 kubelet[1601]: E0913 01:15:43.551210 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:44.047272 kubelet[1601]: I0913 01:15:44.047233 1601 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=38.673177668 podStartE2EDuration="39.047221211s" podCreationTimestamp="2025-09-13 01:15:05 +0000 UTC" firstStartedPulling="2025-09-13 01:15:43.09881682 +0000 UTC m=+219.046613791" lastFinishedPulling="2025-09-13 01:15:43.472860363 +0000 UTC m=+219.420657334" observedRunningTime="2025-09-13 01:15:44.041434224 +0000 UTC m=+219.989231207" watchObservedRunningTime="2025-09-13 01:15:44.047221211 +0000 UTC m=+219.995018188" Sep 13 01:15:44.311210 systemd-networkd[1063]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 01:15:44.394676 kubelet[1601]: E0913 01:15:44.394641 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:44.551685 kubelet[1601]: E0913 01:15:44.551660 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:45.552575 kubelet[1601]: E0913 01:15:45.552543 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:46.553659 kubelet[1601]: E0913 01:15:46.553635 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:47.419843 systemd[1]: run-containerd-runc-k8s.io-d2810b8811d459d7d30433a9ad8193ba07d9e297801c6a2c406e0a15790f832f-runc.dhrpJt.mount: Deactivated successfully. Sep 13 01:15:47.553715 kubelet[1601]: E0913 01:15:47.553694 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:48.554707 kubelet[1601]: E0913 01:15:48.554688 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:49.555162 kubelet[1601]: E0913 01:15:49.555141 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:50.555944 kubelet[1601]: E0913 01:15:50.555919 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:51.556639 kubelet[1601]: E0913 01:15:51.556578 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:52.556964 kubelet[1601]: E0913 01:15:52.556944 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:53.557503 kubelet[1601]: E0913 01:15:53.557474 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:54.558421 kubelet[1601]: E0913 01:15:54.558397 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:55.558855 kubelet[1601]: E0913 01:15:55.558822 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:56.559557 kubelet[1601]: E0913 01:15:56.559533 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:57.560655 kubelet[1601]: E0913 01:15:57.560629 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:58.561981 kubelet[1601]: E0913 01:15:58.561940 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:15:59.562187 kubelet[1601]: E0913 01:15:59.562162 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:00.563247 kubelet[1601]: E0913 01:16:00.563193 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:01.563584 kubelet[1601]: E0913 01:16:01.563559 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:02.564274 kubelet[1601]: E0913 01:16:02.564244 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:03.564678 kubelet[1601]: E0913 01:16:03.564644 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:04.395293 kubelet[1601]: E0913 01:16:04.395263 1601 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:04.564748 kubelet[1601]: E0913 01:16:04.564714 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:04.885277 kernel: kauditd_printk_skb: 459 callbacks suppressed Sep 13 01:16:04.885380 kernel: audit: type=1325 audit(1757726164.884:968): table=filter:85 family=2 entries=8 op=nft_register_rule pid=3577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:04.884000 audit[3577]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=3577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:04.884000 audit[3577]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffccdb5b0d0 a2=0 a3=7ffccdb5b0bc items=0 ppid=1824 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:04.890896 kernel: audit: type=1300 audit(1757726164.884:968): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffccdb5b0d0 a2=0 a3=7ffccdb5b0bc items=0 ppid=1824 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:04.890958 kernel: audit: type=1327 audit(1757726164.884:968): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:04.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:04.895000 audit[3577]: NETFILTER_CFG table=nat:86 family=2 entries=62 op=nft_unregister_chain pid=3577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:04.895000 audit[3577]: SYSCALL arch=c000003e syscall=46 success=yes exit=20228 a0=3 a1=7ffccdb5b0d0 a2=0 a3=7ffccdb5b0bc items=0 ppid=1824 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:04.901893 kernel: audit: type=1325 audit(1757726164.895:969): table=nat:86 family=2 entries=62 op=nft_unregister_chain pid=3577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:04.901926 kernel: audit: type=1300 audit(1757726164.895:969): arch=c000003e syscall=46 success=yes exit=20228 a0=3 a1=7ffccdb5b0d0 a2=0 a3=7ffccdb5b0bc items=0 ppid=1824 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:04.901944 kernel: audit: type=1327 audit(1757726164.895:969): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:04.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:04.991000 audit[3579]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=3579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:04.991000 audit[3579]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe9b20b3a0 a2=0 a3=7ffe9b20b38c items=0 ppid=1824 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:04.997548 kernel: audit: type=1325 audit(1757726164.991:970): table=filter:87 family=2 entries=9 op=nft_register_rule pid=3579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:04.997594 kernel: audit: type=1300 audit(1757726164.991:970): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe9b20b3a0 a2=0 a3=7ffe9b20b38c items=0 ppid=1824 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:04.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:04.999407 kernel: audit: type=1327 audit(1757726164.991:970): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:04.998000 audit[3579]: NETFILTER_CFG table=nat:88 family=2 entries=55 op=nft_unregister_chain pid=3579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:05.001484 kernel: audit: type=1325 audit(1757726164.998:971): table=nat:88 family=2 entries=55 op=nft_unregister_chain pid=3579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:04.998000 audit[3579]: SYSCALL arch=c000003e syscall=46 success=yes exit=16780 a0=3 a1=7ffe9b20b3a0 a2=0 a3=7ffe9b20b38c items=0 ppid=1824 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:04.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:05.565261 kubelet[1601]: E0913 01:16:05.565229 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:06.010000 audit[3581]: NETFILTER_CFG table=filter:89 family=2 entries=16 op=nft_register_rule pid=3581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:06.010000 audit[3581]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd90d201b0 a2=0 a3=7ffd90d2019c items=0 ppid=1824 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:06.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:06.012000 audit[3581]: NETFILTER_CFG table=nat:90 family=2 entries=90 op=nft_unregister_chain pid=3581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:16:06.012000 audit[3581]: SYSCALL arch=c000003e syscall=46 success=yes exit=13836 a0=3 a1=7ffd90d201b0 a2=0 a3=7ffd90d2019c items=0 ppid=1824 pid=3581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:16:06.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:16:06.565441 kubelet[1601]: E0913 01:16:06.565423 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:07.566124 kubelet[1601]: E0913 01:16:07.566090 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:08.566744 kubelet[1601]: E0913 01:16:08.566716 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:09.567714 kubelet[1601]: E0913 01:16:09.567685 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:10.568538 kubelet[1601]: E0913 01:16:10.568519 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:11.569272 kubelet[1601]: E0913 01:16:11.569241 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:12.569818 kubelet[1601]: E0913 01:16:12.569752 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:13.570182 kubelet[1601]: E0913 01:16:13.570152 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:14.570598 kubelet[1601]: E0913 01:16:14.570580 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:16:15.571278 kubelet[1601]: E0913 01:16:15.571250 1601 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"