Oct 29 04:41:12.140619 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Oct 28 23:40:27 -00 2025 Oct 29 04:41:12.140657 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 04:41:12.140677 kernel: BIOS-provided physical RAM map: Oct 29 04:41:12.140687 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 29 04:41:12.140696 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 29 04:41:12.140705 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 29 04:41:12.140715 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Oct 29 04:41:12.140725 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Oct 29 04:41:12.140734 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 29 04:41:12.140744 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 29 04:41:12.140757 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 29 04:41:12.140767 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 29 04:41:12.140776 kernel: NX (Execute Disable) protection: active Oct 29 04:41:12.140786 kernel: SMBIOS 2.8 present. Oct 29 04:41:12.140798 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.16.0-3.module_el8.7.0+3346+68867adb 04/01/2014 Oct 29 04:41:12.140808 kernel: Hypervisor detected: KVM Oct 29 04:41:12.140822 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 29 04:41:12.140832 kernel: kvm-clock: cpu 0, msr 471a0001, primary cpu clock Oct 29 04:41:12.140850 kernel: kvm-clock: using sched offset of 5581773423 cycles Oct 29 04:41:12.140866 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 29 04:41:12.140876 kernel: tsc: Detected 2799.998 MHz processor Oct 29 04:41:12.140887 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 29 04:41:12.140897 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 29 04:41:12.140908 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Oct 29 04:41:12.140918 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 29 04:41:12.140937 kernel: Using GB pages for direct mapping Oct 29 04:41:12.140947 kernel: ACPI: Early table checksum verification disabled Oct 29 04:41:12.140957 kernel: ACPI: RSDP 0x00000000000F59E0 000014 (v00 BOCHS ) Oct 29 04:41:12.140968 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:41:12.140978 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:41:12.140988 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:41:12.140999 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Oct 29 04:41:12.141009 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:41:12.141026 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:41:12.141053 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:41:12.141063 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:41:12.141073 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Oct 29 04:41:12.141083 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Oct 29 04:41:12.141093 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Oct 29 04:41:12.141116 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Oct 29 04:41:12.141164 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Oct 29 04:41:12.141180 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Oct 29 04:41:12.141191 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Oct 29 04:41:12.141202 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 29 04:41:12.141213 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 29 04:41:12.141224 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 29 04:41:12.141235 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Oct 29 04:41:12.141250 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 29 04:41:12.141264 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Oct 29 04:41:12.141276 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 29 04:41:12.141286 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Oct 29 04:41:12.141297 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 29 04:41:12.141312 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Oct 29 04:41:12.141323 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 29 04:41:12.141334 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Oct 29 04:41:12.141345 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 29 04:41:12.141355 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Oct 29 04:41:12.141375 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 29 04:41:12.141390 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Oct 29 04:41:12.141417 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 29 04:41:12.141438 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 29 04:41:12.141449 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Oct 29 04:41:12.141461 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Oct 29 04:41:12.141472 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Oct 29 04:41:12.141483 kernel: Zone ranges: Oct 29 04:41:12.141498 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 29 04:41:12.141510 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Oct 29 04:41:12.141527 kernel: Normal empty Oct 29 04:41:12.141542 kernel: Movable zone start for each node Oct 29 04:41:12.141554 kernel: Early memory node ranges Oct 29 04:41:12.141575 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 29 04:41:12.141586 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Oct 29 04:41:12.141597 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Oct 29 04:41:12.141608 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 29 04:41:12.141618 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 29 04:41:12.141629 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Oct 29 04:41:12.141645 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 29 04:41:12.141656 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 29 04:41:12.141667 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 29 04:41:12.141678 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 29 04:41:12.141689 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 29 04:41:12.141700 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 29 04:41:12.141711 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 29 04:41:12.141722 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 29 04:41:12.141733 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 29 04:41:12.141747 kernel: TSC deadline timer available Oct 29 04:41:12.141758 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Oct 29 04:41:12.141769 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 29 04:41:12.141780 kernel: Booting paravirtualized kernel on KVM Oct 29 04:41:12.141791 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 29 04:41:12.141802 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 29 04:41:12.141813 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 29 04:41:12.141824 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 29 04:41:12.141834 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 29 04:41:12.141849 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Oct 29 04:41:12.141860 kernel: kvm-guest: PV spinlocks enabled Oct 29 04:41:12.141871 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 29 04:41:12.141882 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Oct 29 04:41:12.141893 kernel: Policy zone: DMA32 Oct 29 04:41:12.141905 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 04:41:12.141921 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 29 04:41:12.141931 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 29 04:41:12.141947 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 29 04:41:12.141958 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 29 04:41:12.141969 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 192524K reserved, 0K cma-reserved) Oct 29 04:41:12.141983 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 29 04:41:12.141994 kernel: Kernel/User page tables isolation: enabled Oct 29 04:41:12.142005 kernel: ftrace: allocating 34614 entries in 136 pages Oct 29 04:41:12.142016 kernel: ftrace: allocated 136 pages with 2 groups Oct 29 04:41:12.142027 kernel: rcu: Hierarchical RCU implementation. Oct 29 04:41:12.142038 kernel: rcu: RCU event tracing is enabled. Oct 29 04:41:12.142059 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 29 04:41:12.142075 kernel: Rude variant of Tasks RCU enabled. Oct 29 04:41:12.142090 kernel: Tracing variant of Tasks RCU enabled. Oct 29 04:41:12.142102 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 29 04:41:12.142113 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 29 04:41:12.142124 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Oct 29 04:41:12.142135 kernel: random: crng init done Oct 29 04:41:12.142159 kernel: Console: colour VGA+ 80x25 Oct 29 04:41:12.142171 kernel: printk: console [tty0] enabled Oct 29 04:41:12.142182 kernel: printk: console [ttyS0] enabled Oct 29 04:41:12.142194 kernel: ACPI: Core revision 20210730 Oct 29 04:41:12.142205 kernel: APIC: Switch to symmetric I/O mode setup Oct 29 04:41:12.142226 kernel: x2apic enabled Oct 29 04:41:12.142238 kernel: Switched APIC routing to physical x2apic. Oct 29 04:41:12.142250 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Oct 29 04:41:12.142261 kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 29 04:41:12.142273 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 29 04:41:12.142288 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 29 04:41:12.142300 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 29 04:41:12.142311 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 29 04:41:12.142322 kernel: Spectre V2 : Mitigation: Retpolines Oct 29 04:41:12.142334 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 29 04:41:12.142357 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Oct 29 04:41:12.142368 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 29 04:41:12.142379 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 29 04:41:12.142389 kernel: MDS: Mitigation: Clear CPU buffers Oct 29 04:41:12.142400 kernel: MMIO Stale Data: Unknown: No mitigations Oct 29 04:41:12.142414 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 29 04:41:12.145533 kernel: active return thunk: its_return_thunk Oct 29 04:41:12.145550 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 29 04:41:12.145586 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 29 04:41:12.145598 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 29 04:41:12.145610 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 29 04:41:12.145622 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 29 04:41:12.145633 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 29 04:41:12.145645 kernel: Freeing SMP alternatives memory: 32K Oct 29 04:41:12.145656 kernel: pid_max: default: 32768 minimum: 301 Oct 29 04:41:12.145667 kernel: LSM: Security Framework initializing Oct 29 04:41:12.145686 kernel: SELinux: Initializing. Oct 29 04:41:12.145698 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 04:41:12.145709 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 04:41:12.145721 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Oct 29 04:41:12.145733 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Oct 29 04:41:12.145745 kernel: signal: max sigframe size: 1776 Oct 29 04:41:12.145787 kernel: rcu: Hierarchical SRCU implementation. Oct 29 04:41:12.145799 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 29 04:41:12.145830 kernel: smp: Bringing up secondary CPUs ... Oct 29 04:41:12.145851 kernel: x86: Booting SMP configuration: Oct 29 04:41:12.145889 kernel: .... node #0, CPUs: #1 Oct 29 04:41:12.145907 kernel: kvm-clock: cpu 1, msr 471a0041, secondary cpu clock Oct 29 04:41:12.145919 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 29 04:41:12.145946 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Oct 29 04:41:12.145966 kernel: smp: Brought up 1 node, 2 CPUs Oct 29 04:41:12.145978 kernel: smpboot: Max logical packages: 16 Oct 29 04:41:12.145990 kernel: smpboot: Total of 2 processors activated (11199.99 BogoMIPS) Oct 29 04:41:12.146021 kernel: devtmpfs: initialized Oct 29 04:41:12.146033 kernel: x86/mm: Memory block size: 128MB Oct 29 04:41:12.146044 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 29 04:41:12.146080 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 29 04:41:12.146092 kernel: pinctrl core: initialized pinctrl subsystem Oct 29 04:41:12.146104 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 29 04:41:12.146133 kernel: audit: initializing netlink subsys (disabled) Oct 29 04:41:12.146148 kernel: audit: type=2000 audit(1761712870.826:1): state=initialized audit_enabled=0 res=1 Oct 29 04:41:12.146160 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 29 04:41:12.146172 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 29 04:41:12.146202 kernel: cpuidle: using governor menu Oct 29 04:41:12.146219 kernel: ACPI: bus type PCI registered Oct 29 04:41:12.146254 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 29 04:41:12.146269 kernel: dca service started, version 1.12.1 Oct 29 04:41:12.146281 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 29 04:41:12.146293 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 29 04:41:12.146334 kernel: PCI: Using configuration type 1 for base access Oct 29 04:41:12.146347 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 29 04:41:12.146376 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 29 04:41:12.146391 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 29 04:41:12.146450 kernel: ACPI: Added _OSI(Module Device) Oct 29 04:41:12.146467 kernel: ACPI: Added _OSI(Processor Device) Oct 29 04:41:12.146496 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 29 04:41:12.146512 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 29 04:41:12.146524 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 29 04:41:12.146535 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 29 04:41:12.146583 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 29 04:41:12.146596 kernel: ACPI: Interpreter enabled Oct 29 04:41:12.146629 kernel: ACPI: PM: (supports S0 S5) Oct 29 04:41:12.146641 kernel: ACPI: Using IOAPIC for interrupt routing Oct 29 04:41:12.146660 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 29 04:41:12.146690 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 29 04:41:12.146702 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 29 04:41:12.147046 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 29 04:41:12.147221 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 29 04:41:12.147385 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 29 04:41:12.147403 kernel: PCI host bridge to bus 0000:00 Oct 29 04:41:12.147613 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 29 04:41:12.147762 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 29 04:41:12.147936 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 29 04:41:12.148097 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Oct 29 04:41:12.148251 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 29 04:41:12.151403 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Oct 29 04:41:12.151598 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 29 04:41:12.151804 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 29 04:41:12.152012 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Oct 29 04:41:12.152178 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Oct 29 04:41:12.152338 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Oct 29 04:41:12.152524 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Oct 29 04:41:12.152705 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 29 04:41:12.152898 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.153065 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Oct 29 04:41:12.153254 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.154517 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Oct 29 04:41:12.154733 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.154896 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Oct 29 04:41:12.155078 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.155238 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Oct 29 04:41:12.155456 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.155630 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Oct 29 04:41:12.155815 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.156017 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Oct 29 04:41:12.156205 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.156365 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Oct 29 04:41:12.164879 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Oct 29 04:41:12.165097 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Oct 29 04:41:12.165348 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 29 04:41:12.165548 kernel: pci 0000:00:03.0: reg 0x10: [io 0xd0c0-0xd0df] Oct 29 04:41:12.165727 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Oct 29 04:41:12.165907 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Oct 29 04:41:12.166077 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Oct 29 04:41:12.166281 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 29 04:41:12.166473 kernel: pci 0000:00:04.0: reg 0x10: [io 0xd000-0xd07f] Oct 29 04:41:12.166655 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Oct 29 04:41:12.166812 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Oct 29 04:41:12.167013 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 29 04:41:12.167195 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 29 04:41:12.167426 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 29 04:41:12.167650 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xd0e0-0xd0ff] Oct 29 04:41:12.167835 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Oct 29 04:41:12.168058 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 29 04:41:12.168250 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 29 04:41:12.168543 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Oct 29 04:41:12.168775 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Oct 29 04:41:12.168965 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 29 04:41:12.169151 kernel: pci 0000:00:02.0: bridge window [io 0xc000-0xcfff] Oct 29 04:41:12.169319 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 29 04:41:12.169492 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:41:12.169717 kernel: pci_bus 0000:02: extended config space not accessible Oct 29 04:41:12.169921 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Oct 29 04:41:12.170095 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Oct 29 04:41:12.170261 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 29 04:41:12.170451 kernel: pci 0000:01:00.0: bridge window [io 0xc000-0xcfff] Oct 29 04:41:12.170700 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 29 04:41:12.170888 kernel: pci 0000:01:00.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:41:12.171157 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Oct 29 04:41:12.171334 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Oct 29 04:41:12.173617 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 29 04:41:12.173820 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 29 04:41:12.173984 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 04:41:12.174176 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Oct 29 04:41:12.174349 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Oct 29 04:41:12.174595 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 29 04:41:12.174756 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 29 04:41:12.174950 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 04:41:12.175113 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 29 04:41:12.175269 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 29 04:41:12.175462 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 04:41:12.175662 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 29 04:41:12.175818 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 29 04:41:12.175987 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 04:41:12.176146 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 29 04:41:12.176300 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 29 04:41:12.176485 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 04:41:12.176655 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 29 04:41:12.176810 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 29 04:41:12.176967 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 04:41:12.177123 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 29 04:41:12.177286 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 29 04:41:12.177474 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 04:41:12.177492 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 29 04:41:12.177504 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 29 04:41:12.177515 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 29 04:41:12.177531 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 29 04:41:12.177563 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 29 04:41:12.177577 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 29 04:41:12.177599 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 29 04:41:12.177617 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 29 04:41:12.177629 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 29 04:41:12.177641 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 29 04:41:12.177652 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 29 04:41:12.177664 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 29 04:41:12.177675 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 29 04:41:12.177687 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 29 04:41:12.177699 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 29 04:41:12.177710 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 29 04:41:12.177726 kernel: iommu: Default domain type: Translated Oct 29 04:41:12.177738 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 29 04:41:12.177899 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 29 04:41:12.178055 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 29 04:41:12.178208 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 29 04:41:12.178226 kernel: vgaarb: loaded Oct 29 04:41:12.178238 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 29 04:41:12.178250 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 29 04:41:12.178279 kernel: PTP clock support registered Oct 29 04:41:12.178290 kernel: PCI: Using ACPI for IRQ routing Oct 29 04:41:12.178302 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 29 04:41:12.178313 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 29 04:41:12.178336 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Oct 29 04:41:12.178354 kernel: clocksource: Switched to clocksource kvm-clock Oct 29 04:41:12.178365 kernel: VFS: Disk quotas dquot_6.6.0 Oct 29 04:41:12.178376 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 29 04:41:12.178387 kernel: pnp: PnP ACPI init Oct 29 04:41:12.178636 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 29 04:41:12.178656 kernel: pnp: PnP ACPI: found 5 devices Oct 29 04:41:12.178668 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 29 04:41:12.178680 kernel: NET: Registered PF_INET protocol family Oct 29 04:41:12.178692 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 29 04:41:12.178704 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 29 04:41:12.178716 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 29 04:41:12.178728 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 29 04:41:12.178746 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 29 04:41:12.178758 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 29 04:41:12.178770 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 04:41:12.178782 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 04:41:12.178793 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 29 04:41:12.178805 kernel: NET: Registered PF_XDP protocol family Oct 29 04:41:12.178958 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Oct 29 04:41:12.179117 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Oct 29 04:41:12.179281 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Oct 29 04:41:12.179462 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 29 04:41:12.179693 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 29 04:41:12.179853 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 29 04:41:12.180010 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 29 04:41:12.180167 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x1000-0x1fff] Oct 29 04:41:12.180333 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x2000-0x2fff] Oct 29 04:41:12.190551 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x3000-0x3fff] Oct 29 04:41:12.190742 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x4000-0x4fff] Oct 29 04:41:12.190908 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x5000-0x5fff] Oct 29 04:41:12.191125 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x6000-0x6fff] Oct 29 04:41:12.191312 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x7000-0x7fff] Oct 29 04:41:12.191501 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 29 04:41:12.191681 kernel: pci 0000:01:00.0: bridge window [io 0xc000-0xcfff] Oct 29 04:41:12.191889 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 29 04:41:12.192057 kernel: pci 0000:01:00.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:41:12.192222 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 29 04:41:12.192446 kernel: pci 0000:00:02.0: bridge window [io 0xc000-0xcfff] Oct 29 04:41:12.192621 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 29 04:41:12.192780 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:41:12.192936 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 29 04:41:12.193091 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x1fff] Oct 29 04:41:12.193252 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 29 04:41:12.193428 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 04:41:12.193633 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 29 04:41:12.193811 kernel: pci 0000:00:02.2: bridge window [io 0x2000-0x2fff] Oct 29 04:41:12.193971 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 29 04:41:12.194130 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 04:41:12.194287 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 29 04:41:12.194467 kernel: pci 0000:00:02.3: bridge window [io 0x3000-0x3fff] Oct 29 04:41:12.194648 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 29 04:41:12.194812 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 04:41:12.194968 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 29 04:41:12.195123 kernel: pci 0000:00:02.4: bridge window [io 0x4000-0x4fff] Oct 29 04:41:12.195277 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 29 04:41:12.195451 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 04:41:12.195625 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 29 04:41:12.195784 kernel: pci 0000:00:02.5: bridge window [io 0x5000-0x5fff] Oct 29 04:41:12.195949 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 29 04:41:12.196114 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 04:41:12.196296 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 29 04:41:12.202740 kernel: pci 0000:00:02.6: bridge window [io 0x6000-0x6fff] Oct 29 04:41:12.202912 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 29 04:41:12.203078 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 04:41:12.203243 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 29 04:41:12.203413 kernel: pci 0000:00:02.7: bridge window [io 0x7000-0x7fff] Oct 29 04:41:12.203623 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 29 04:41:12.203780 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 04:41:12.203930 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 29 04:41:12.204096 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 29 04:41:12.204263 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 29 04:41:12.204414 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Oct 29 04:41:12.204747 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 29 04:41:12.204988 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Oct 29 04:41:12.205324 kernel: pci_bus 0000:01: resource 0 [io 0xc000-0xcfff] Oct 29 04:41:12.205602 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Oct 29 04:41:12.205758 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:41:12.205923 kernel: pci_bus 0000:02: resource 0 [io 0xc000-0xcfff] Oct 29 04:41:12.206116 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Oct 29 04:41:12.206291 kernel: pci_bus 0000:02: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:41:12.206499 kernel: pci_bus 0000:03: resource 0 [io 0x1000-0x1fff] Oct 29 04:41:12.206669 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Oct 29 04:41:12.206854 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 04:41:12.207042 kernel: pci_bus 0000:04: resource 0 [io 0x2000-0x2fff] Oct 29 04:41:12.207200 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Oct 29 04:41:12.207362 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 04:41:12.211036 kernel: pci_bus 0000:05: resource 0 [io 0x3000-0x3fff] Oct 29 04:41:12.211199 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Oct 29 04:41:12.211352 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 04:41:12.211579 kernel: pci_bus 0000:06: resource 0 [io 0x4000-0x4fff] Oct 29 04:41:12.211734 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Oct 29 04:41:12.211882 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 04:41:12.212085 kernel: pci_bus 0000:07: resource 0 [io 0x5000-0x5fff] Oct 29 04:41:12.212267 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Oct 29 04:41:12.212434 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 04:41:12.212649 kernel: pci_bus 0000:08: resource 0 [io 0x6000-0x6fff] Oct 29 04:41:12.212803 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Oct 29 04:41:12.212954 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 04:41:12.213130 kernel: pci_bus 0000:09: resource 0 [io 0x7000-0x7fff] Oct 29 04:41:12.213291 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Oct 29 04:41:12.213457 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 04:41:12.213477 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 29 04:41:12.213491 kernel: PCI: CLS 0 bytes, default 64 Oct 29 04:41:12.213503 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 29 04:41:12.213516 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Oct 29 04:41:12.213529 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 29 04:41:12.213547 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Oct 29 04:41:12.213570 kernel: Initialise system trusted keyrings Oct 29 04:41:12.213583 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 29 04:41:12.213595 kernel: Key type asymmetric registered Oct 29 04:41:12.213607 kernel: Asymmetric key parser 'x509' registered Oct 29 04:41:12.213619 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 29 04:41:12.213632 kernel: io scheduler mq-deadline registered Oct 29 04:41:12.213644 kernel: io scheduler kyber registered Oct 29 04:41:12.213656 kernel: io scheduler bfq registered Oct 29 04:41:12.213822 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Oct 29 04:41:12.214015 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Oct 29 04:41:12.214181 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.214342 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Oct 29 04:41:12.214522 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Oct 29 04:41:12.214704 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.214865 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Oct 29 04:41:12.215032 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Oct 29 04:41:12.215192 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.215377 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Oct 29 04:41:12.215618 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Oct 29 04:41:12.215783 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.215975 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Oct 29 04:41:12.216151 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Oct 29 04:41:12.216315 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.216499 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Oct 29 04:41:12.216673 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Oct 29 04:41:12.216832 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.216993 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Oct 29 04:41:12.217156 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Oct 29 04:41:12.217341 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.223577 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Oct 29 04:41:12.223757 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Oct 29 04:41:12.223919 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:41:12.223948 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 29 04:41:12.223971 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 29 04:41:12.223984 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 29 04:41:12.223997 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 29 04:41:12.224010 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 29 04:41:12.224023 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 29 04:41:12.224044 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 29 04:41:12.224057 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 29 04:41:12.224070 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 29 04:41:12.224241 kernel: rtc_cmos 00:03: RTC can wake from S4 Oct 29 04:41:12.224399 kernel: rtc_cmos 00:03: registered as rtc0 Oct 29 04:41:12.224583 kernel: rtc_cmos 00:03: setting system clock to 2025-10-29T04:41:11 UTC (1761712871) Oct 29 04:41:12.224731 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Oct 29 04:41:12.224750 kernel: intel_pstate: CPU model not supported Oct 29 04:41:12.224762 kernel: NET: Registered PF_INET6 protocol family Oct 29 04:41:12.224775 kernel: Segment Routing with IPv6 Oct 29 04:41:12.224787 kernel: In-situ OAM (IOAM) with IPv6 Oct 29 04:41:12.224800 kernel: NET: Registered PF_PACKET protocol family Oct 29 04:41:12.224819 kernel: Key type dns_resolver registered Oct 29 04:41:12.224832 kernel: IPI shorthand broadcast: enabled Oct 29 04:41:12.224845 kernel: sched_clock: Marking stable (1032192754, 222828872)->(1553360276, -298338650) Oct 29 04:41:12.224857 kernel: registered taskstats version 1 Oct 29 04:41:12.224870 kernel: Loading compiled-in X.509 certificates Oct 29 04:41:12.224882 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 88bc8a4d729b2f514b4a44a35b666d3248ded14a' Oct 29 04:41:12.224894 kernel: Key type .fscrypt registered Oct 29 04:41:12.224906 kernel: Key type fscrypt-provisioning registered Oct 29 04:41:12.224918 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 29 04:41:12.224935 kernel: ima: Allocated hash algorithm: sha1 Oct 29 04:41:12.224948 kernel: ima: No architecture policies found Oct 29 04:41:12.224960 kernel: clk: Disabling unused clocks Oct 29 04:41:12.224972 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 29 04:41:12.224984 kernel: Write protecting the kernel read-only data: 28672k Oct 29 04:41:12.224997 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 29 04:41:12.225009 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 29 04:41:12.225022 kernel: Run /init as init process Oct 29 04:41:12.225034 kernel: with arguments: Oct 29 04:41:12.225050 kernel: /init Oct 29 04:41:12.225062 kernel: with environment: Oct 29 04:41:12.225074 kernel: HOME=/ Oct 29 04:41:12.225086 kernel: TERM=linux Oct 29 04:41:12.225097 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 29 04:41:12.225113 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 04:41:12.225132 systemd[1]: Detected virtualization kvm. Oct 29 04:41:12.225146 systemd[1]: Detected architecture x86-64. Oct 29 04:41:12.225163 systemd[1]: Running in initrd. Oct 29 04:41:12.225175 systemd[1]: No hostname configured, using default hostname. Oct 29 04:41:12.225188 systemd[1]: Hostname set to . Oct 29 04:41:12.225201 systemd[1]: Initializing machine ID from VM UUID. Oct 29 04:41:12.225214 systemd[1]: Queued start job for default target initrd.target. Oct 29 04:41:12.225227 systemd[1]: Started systemd-ask-password-console.path. Oct 29 04:41:12.225240 systemd[1]: Reached target cryptsetup.target. Oct 29 04:41:12.225252 systemd[1]: Reached target paths.target. Oct 29 04:41:12.225270 systemd[1]: Reached target slices.target. Oct 29 04:41:12.225282 systemd[1]: Reached target swap.target. Oct 29 04:41:12.225299 systemd[1]: Reached target timers.target. Oct 29 04:41:12.225313 systemd[1]: Listening on iscsid.socket. Oct 29 04:41:12.225326 systemd[1]: Listening on iscsiuio.socket. Oct 29 04:41:12.225339 systemd[1]: Listening on systemd-journald-audit.socket. Oct 29 04:41:12.225352 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 29 04:41:12.225369 systemd[1]: Listening on systemd-journald.socket. Oct 29 04:41:12.225383 systemd[1]: Listening on systemd-networkd.socket. Oct 29 04:41:12.225396 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 04:41:12.225421 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 04:41:12.225437 systemd[1]: Reached target sockets.target. Oct 29 04:41:12.225450 systemd[1]: Starting kmod-static-nodes.service... Oct 29 04:41:12.225463 systemd[1]: Finished network-cleanup.service. Oct 29 04:41:12.225476 systemd[1]: Starting systemd-fsck-usr.service... Oct 29 04:41:12.225489 systemd[1]: Starting systemd-journald.service... Oct 29 04:41:12.225507 systemd[1]: Starting systemd-modules-load.service... Oct 29 04:41:12.225520 systemd[1]: Starting systemd-resolved.service... Oct 29 04:41:12.225533 systemd[1]: Starting systemd-vconsole-setup.service... Oct 29 04:41:12.225546 systemd[1]: Finished kmod-static-nodes.service. Oct 29 04:41:12.225585 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 29 04:41:12.225605 systemd-journald[201]: Journal started Oct 29 04:41:12.225694 systemd-journald[201]: Runtime Journal (/run/log/journal/8fe92679c0694174be04cd25dbd928d9) is 4.7M, max 38.1M, 33.3M free. Oct 29 04:41:12.142466 systemd-modules-load[202]: Inserted module 'overlay' Oct 29 04:41:12.235276 kernel: Bridge firewalling registered Oct 29 04:41:12.193792 systemd-resolved[203]: Positive Trust Anchors: Oct 29 04:41:12.242258 systemd[1]: Started systemd-resolved.service. Oct 29 04:41:12.242296 kernel: audit: type=1130 audit(1761712872.235:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.193808 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 04:41:12.250679 systemd[1]: Started systemd-journald.service. Oct 29 04:41:12.250707 kernel: audit: type=1130 audit(1761712872.242:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.193847 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 04:41:12.258272 kernel: audit: type=1130 audit(1761712872.250:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.198113 systemd-resolved[203]: Defaulting to hostname 'linux'. Oct 29 04:41:12.264008 kernel: audit: type=1130 audit(1761712872.258:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.228789 systemd-modules-load[202]: Inserted module 'br_netfilter' Oct 29 04:41:12.270848 kernel: audit: type=1130 audit(1761712872.264:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.270876 kernel: SCSI subsystem initialized Oct 29 04:41:12.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.251690 systemd[1]: Finished systemd-fsck-usr.service. Oct 29 04:41:12.259130 systemd[1]: Finished systemd-vconsole-setup.service. Oct 29 04:41:12.264851 systemd[1]: Reached target nss-lookup.target. Oct 29 04:41:12.272491 systemd[1]: Starting dracut-cmdline-ask.service... Oct 29 04:41:12.274079 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 29 04:41:12.287584 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 29 04:41:12.309537 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 29 04:41:12.309588 kernel: device-mapper: uevent: version 1.0.3 Oct 29 04:41:12.309608 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 29 04:41:12.309625 kernel: audit: type=1130 audit(1761712872.302:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.295906 systemd-modules-load[202]: Inserted module 'dm_multipath' Oct 29 04:41:12.315125 kernel: audit: type=1130 audit(1761712872.309:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.303746 systemd[1]: Finished systemd-modules-load.service. Oct 29 04:41:12.337738 kernel: audit: type=1130 audit(1761712872.329:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.310634 systemd[1]: Finished dracut-cmdline-ask.service. Oct 29 04:41:12.331261 systemd[1]: Starting dracut-cmdline.service... Oct 29 04:41:12.336394 systemd[1]: Starting systemd-sysctl.service... Oct 29 04:41:12.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.353339 dracut-cmdline[220]: dracut-dracut-053 Oct 29 04:41:12.354258 kernel: audit: type=1130 audit(1761712872.348:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.347794 systemd[1]: Finished systemd-sysctl.service. Oct 29 04:41:12.354964 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 04:41:12.439438 kernel: Loading iSCSI transport class v2.0-870. Oct 29 04:41:12.460434 kernel: iscsi: registered transport (tcp) Oct 29 04:41:12.488446 kernel: iscsi: registered transport (qla4xxx) Oct 29 04:41:12.488545 kernel: QLogic iSCSI HBA Driver Oct 29 04:41:12.540966 systemd[1]: Finished dracut-cmdline.service. Oct 29 04:41:12.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.543102 systemd[1]: Starting dracut-pre-udev.service... Oct 29 04:41:12.602470 kernel: raid6: sse2x4 gen() 14160 MB/s Oct 29 04:41:12.620460 kernel: raid6: sse2x4 xor() 8145 MB/s Oct 29 04:41:12.638489 kernel: raid6: sse2x2 gen() 9540 MB/s Oct 29 04:41:12.656461 kernel: raid6: sse2x2 xor() 8284 MB/s Oct 29 04:41:12.674475 kernel: raid6: sse2x1 gen() 9852 MB/s Oct 29 04:41:12.693060 kernel: raid6: sse2x1 xor() 7567 MB/s Oct 29 04:41:12.693154 kernel: raid6: using algorithm sse2x4 gen() 14160 MB/s Oct 29 04:41:12.693173 kernel: raid6: .... xor() 8145 MB/s, rmw enabled Oct 29 04:41:12.694314 kernel: raid6: using ssse3x2 recovery algorithm Oct 29 04:41:12.711455 kernel: xor: automatically using best checksumming function avx Oct 29 04:41:12.822455 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 29 04:41:12.835725 systemd[1]: Finished dracut-pre-udev.service. Oct 29 04:41:12.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.836000 audit: BPF prog-id=7 op=LOAD Oct 29 04:41:12.836000 audit: BPF prog-id=8 op=LOAD Oct 29 04:41:12.837737 systemd[1]: Starting systemd-udevd.service... Oct 29 04:41:12.856345 systemd-udevd[401]: Using default interface naming scheme 'v252'. Oct 29 04:41:12.865180 systemd[1]: Started systemd-udevd.service. Oct 29 04:41:12.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.870498 systemd[1]: Starting dracut-pre-trigger.service... Oct 29 04:41:12.888179 dracut-pre-trigger[413]: rd.md=0: removing MD RAID activation Oct 29 04:41:12.928671 systemd[1]: Finished dracut-pre-trigger.service. Oct 29 04:41:12.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:12.930440 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 04:41:13.031127 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 04:41:13.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:13.128438 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Oct 29 04:41:13.177403 kernel: cryptd: max_cpu_qlen set to 1000 Oct 29 04:41:13.177448 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 29 04:41:13.177466 kernel: GPT:17805311 != 125829119 Oct 29 04:41:13.177482 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 29 04:41:13.177498 kernel: GPT:17805311 != 125829119 Oct 29 04:41:13.177513 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 29 04:41:13.177529 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 04:41:13.177581 kernel: AVX version of gcm_enc/dec engaged. Oct 29 04:41:13.177599 kernel: AES CTR mode by8 optimization enabled Oct 29 04:41:13.180749 kernel: libata version 3.00 loaded. Oct 29 04:41:13.184438 kernel: ACPI: bus type USB registered Oct 29 04:41:13.184481 kernel: usbcore: registered new interface driver usbfs Oct 29 04:41:13.184502 kernel: usbcore: registered new interface driver hub Oct 29 04:41:13.184519 kernel: usbcore: registered new device driver usb Oct 29 04:41:13.219900 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 29 04:41:13.335164 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (459) Oct 29 04:41:13.335198 kernel: ahci 0000:00:1f.2: version 3.0 Oct 29 04:41:13.335448 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 29 04:41:13.335470 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 29 04:41:13.335660 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 29 04:41:13.335828 kernel: scsi host0: ahci Oct 29 04:41:13.336044 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 29 04:41:13.336232 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Oct 29 04:41:13.336419 kernel: scsi host1: ahci Oct 29 04:41:13.336679 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Oct 29 04:41:13.336856 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 29 04:41:13.337032 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Oct 29 04:41:13.337205 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Oct 29 04:41:13.337378 kernel: hub 1-0:1.0: USB hub found Oct 29 04:41:13.337629 kernel: hub 1-0:1.0: 4 ports detected Oct 29 04:41:13.337827 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Oct 29 04:41:13.338096 kernel: hub 2-0:1.0: USB hub found Oct 29 04:41:13.338307 kernel: hub 2-0:1.0: 4 ports detected Oct 29 04:41:13.338514 kernel: scsi host2: ahci Oct 29 04:41:13.338741 kernel: scsi host3: ahci Oct 29 04:41:13.338944 kernel: scsi host4: ahci Oct 29 04:41:13.339131 kernel: scsi host5: ahci Oct 29 04:41:13.339315 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Oct 29 04:41:13.339335 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Oct 29 04:41:13.339351 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Oct 29 04:41:13.339367 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Oct 29 04:41:13.339383 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Oct 29 04:41:13.339435 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Oct 29 04:41:13.334222 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 29 04:41:13.340166 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 29 04:41:13.345633 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 29 04:41:13.355233 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 04:41:13.357056 systemd[1]: Starting disk-uuid.service... Oct 29 04:41:13.368436 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 04:41:13.372050 disk-uuid[530]: Primary Header is updated. Oct 29 04:41:13.372050 disk-uuid[530]: Secondary Entries is updated. Oct 29 04:41:13.372050 disk-uuid[530]: Secondary Header is updated. Oct 29 04:41:13.539465 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Oct 29 04:41:13.632479 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 29 04:41:13.632687 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 29 04:41:13.634842 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 29 04:41:13.635433 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 29 04:41:13.639674 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 29 04:41:13.639724 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 29 04:41:13.680441 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 29 04:41:13.687550 kernel: usbcore: registered new interface driver usbhid Oct 29 04:41:13.687603 kernel: usbhid: USB HID core driver Oct 29 04:41:13.696790 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Oct 29 04:41:13.696858 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Oct 29 04:41:14.384492 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 04:41:14.385542 disk-uuid[531]: The operation has completed successfully. Oct 29 04:41:14.443381 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 29 04:41:14.443586 systemd[1]: Finished disk-uuid.service. Oct 29 04:41:14.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.449961 systemd[1]: Starting verity-setup.service... Oct 29 04:41:14.471149 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Oct 29 04:41:14.526349 systemd[1]: Found device dev-mapper-usr.device. Oct 29 04:41:14.528006 systemd[1]: Finished verity-setup.service. Oct 29 04:41:14.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.530013 systemd[1]: Mounting sysusr-usr.mount... Oct 29 04:41:14.625436 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 29 04:41:14.625547 systemd[1]: Mounted sysusr-usr.mount. Oct 29 04:41:14.627019 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 29 04:41:14.629133 systemd[1]: Starting ignition-setup.service... Oct 29 04:41:14.631643 systemd[1]: Starting parse-ip-for-networkd.service... Oct 29 04:41:14.646290 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 04:41:14.646352 kernel: BTRFS info (device vda6): using free space tree Oct 29 04:41:14.646372 kernel: BTRFS info (device vda6): has skinny extents Oct 29 04:41:14.663012 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 29 04:41:14.670182 systemd[1]: Finished ignition-setup.service. Oct 29 04:41:14.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.672178 systemd[1]: Starting ignition-fetch-offline.service... Oct 29 04:41:14.842618 systemd[1]: Finished parse-ip-for-networkd.service. Oct 29 04:41:14.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.850000 audit: BPF prog-id=9 op=LOAD Oct 29 04:41:14.851342 systemd[1]: Starting systemd-networkd.service... Oct 29 04:41:14.928991 systemd-networkd[709]: lo: Link UP Oct 29 04:41:14.929559 systemd-networkd[709]: lo: Gained carrier Oct 29 04:41:14.930601 systemd-networkd[709]: Enumeration completed Oct 29 04:41:14.931082 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 04:41:14.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.932101 systemd[1]: Started systemd-networkd.service. Oct 29 04:41:14.933800 systemd[1]: Reached target network.target. Oct 29 04:41:14.933939 systemd-networkd[709]: eth0: Link UP Oct 29 04:41:14.933946 systemd-networkd[709]: eth0: Gained carrier Oct 29 04:41:14.935631 systemd[1]: Starting iscsiuio.service... Oct 29 04:41:14.971217 systemd[1]: Started iscsiuio.service. Oct 29 04:41:14.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.973403 systemd[1]: Starting iscsid.service... Oct 29 04:41:14.977903 iscsid[714]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 29 04:41:14.977903 iscsid[714]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 29 04:41:14.977903 iscsid[714]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 29 04:41:14.977903 iscsid[714]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 29 04:41:14.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.985531 iscsid[714]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 29 04:41:14.985531 iscsid[714]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 29 04:41:14.980589 systemd-networkd[709]: eth0: DHCPv4 address 10.243.77.174/30, gateway 10.243.77.173 acquired from 10.243.77.173 Oct 29 04:41:14.981598 systemd[1]: Started iscsid.service. Oct 29 04:41:14.984656 systemd[1]: Starting dracut-initqueue.service... Oct 29 04:41:15.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:14.999712 ignition[631]: Ignition 2.14.0 Oct 29 04:41:15.003292 systemd[1]: Finished ignition-fetch-offline.service. Oct 29 04:41:14.999731 ignition[631]: Stage: fetch-offline Oct 29 04:41:15.005251 systemd[1]: Starting ignition-fetch.service... Oct 29 04:41:14.999858 ignition[631]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:41:14.999908 ignition[631]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:41:15.001691 ignition[631]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:41:15.001875 ignition[631]: parsed url from cmdline: "" Oct 29 04:41:15.001883 ignition[631]: no config URL provided Oct 29 04:41:15.001893 ignition[631]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 04:41:15.001909 ignition[631]: no config at "/usr/lib/ignition/user.ign" Oct 29 04:41:15.001918 ignition[631]: failed to fetch config: resource requires networking Oct 29 04:41:15.002328 ignition[631]: Ignition finished successfully Oct 29 04:41:15.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.022652 ignition[720]: Ignition 2.14.0 Oct 29 04:41:15.018725 systemd[1]: Finished dracut-initqueue.service. Oct 29 04:41:15.022664 ignition[720]: Stage: fetch Oct 29 04:41:15.019520 systemd[1]: Reached target remote-fs-pre.target. Oct 29 04:41:15.020115 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 04:41:15.020861 systemd[1]: Reached target remote-fs.target. Oct 29 04:41:15.023054 systemd[1]: Starting dracut-pre-mount.service... Oct 29 04:41:15.030633 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:41:15.030675 ignition[720]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:41:15.031964 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:41:15.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.037528 systemd[1]: Finished dracut-pre-mount.service. Oct 29 04:41:15.032119 ignition[720]: parsed url from cmdline: "" Oct 29 04:41:15.032127 ignition[720]: no config URL provided Oct 29 04:41:15.032137 ignition[720]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 04:41:15.032152 ignition[720]: no config at "/usr/lib/ignition/user.ign" Oct 29 04:41:15.035326 ignition[720]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 29 04:41:15.035420 ignition[720]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 29 04:41:15.036581 ignition[720]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 29 04:41:15.056685 ignition[720]: GET result: OK Oct 29 04:41:15.057226 ignition[720]: parsing config with SHA512: 3a35e9612dd966544b9e3265626a75b3b5078a76619e7363d740eea3a81928ff5ffcf581e529356f3059835cdc0d64d5c38a3a210c541bcaea9f398b6622b8a2 Oct 29 04:41:15.063562 unknown[720]: fetched base config from "system" Oct 29 04:41:15.064015 ignition[720]: fetch: fetch complete Oct 29 04:41:15.063585 unknown[720]: fetched base config from "system" Oct 29 04:41:15.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.064025 ignition[720]: fetch: fetch passed Oct 29 04:41:15.063598 unknown[720]: fetched user config from "openstack" Oct 29 04:41:15.064086 ignition[720]: Ignition finished successfully Oct 29 04:41:15.065742 systemd[1]: Finished ignition-fetch.service. Oct 29 04:41:15.068288 systemd[1]: Starting ignition-kargs.service... Oct 29 04:41:15.090951 ignition[734]: Ignition 2.14.0 Oct 29 04:41:15.090975 ignition[734]: Stage: kargs Oct 29 04:41:15.091265 ignition[734]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:41:15.091314 ignition[734]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:41:15.092993 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:41:15.094665 ignition[734]: kargs: kargs passed Oct 29 04:41:15.094745 ignition[734]: Ignition finished successfully Oct 29 04:41:15.096169 systemd[1]: Finished ignition-kargs.service. Oct 29 04:41:15.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.098580 systemd[1]: Starting ignition-disks.service... Oct 29 04:41:15.115568 ignition[739]: Ignition 2.14.0 Oct 29 04:41:15.115589 ignition[739]: Stage: disks Oct 29 04:41:15.115830 ignition[739]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:41:15.115873 ignition[739]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:41:15.119011 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:41:15.120700 ignition[739]: disks: disks passed Oct 29 04:41:15.120780 ignition[739]: Ignition finished successfully Oct 29 04:41:15.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.121671 systemd[1]: Finished ignition-disks.service. Oct 29 04:41:15.122869 systemd[1]: Reached target initrd-root-device.target. Oct 29 04:41:15.123884 systemd[1]: Reached target local-fs-pre.target. Oct 29 04:41:15.125058 systemd[1]: Reached target local-fs.target. Oct 29 04:41:15.126260 systemd[1]: Reached target sysinit.target. Oct 29 04:41:15.127481 systemd[1]: Reached target basic.target. Oct 29 04:41:15.129793 systemd[1]: Starting systemd-fsck-root.service... Oct 29 04:41:15.154551 systemd-fsck[746]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 29 04:41:15.159070 systemd[1]: Finished systemd-fsck-root.service. Oct 29 04:41:15.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.160980 systemd[1]: Mounting sysroot.mount... Oct 29 04:41:15.174453 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 29 04:41:15.175382 systemd[1]: Mounted sysroot.mount. Oct 29 04:41:15.176115 systemd[1]: Reached target initrd-root-fs.target. Oct 29 04:41:15.178680 systemd[1]: Mounting sysroot-usr.mount... Oct 29 04:41:15.179910 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 29 04:41:15.180902 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 29 04:41:15.181699 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 29 04:41:15.181754 systemd[1]: Reached target ignition-diskful.target. Oct 29 04:41:15.188185 systemd[1]: Mounted sysroot-usr.mount. Oct 29 04:41:15.190285 systemd[1]: Starting initrd-setup-root.service... Oct 29 04:41:15.198987 initrd-setup-root[757]: cut: /sysroot/etc/passwd: No such file or directory Oct 29 04:41:15.217286 initrd-setup-root[765]: cut: /sysroot/etc/group: No such file or directory Oct 29 04:41:15.227330 initrd-setup-root[773]: cut: /sysroot/etc/shadow: No such file or directory Oct 29 04:41:15.239042 initrd-setup-root[782]: cut: /sysroot/etc/gshadow: No such file or directory Oct 29 04:41:15.313154 systemd[1]: Finished initrd-setup-root.service. Oct 29 04:41:15.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.322497 systemd[1]: Starting ignition-mount.service... Oct 29 04:41:15.324532 systemd[1]: Starting sysroot-boot.service... Oct 29 04:41:15.334805 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Oct 29 04:41:15.355459 coreos-metadata[752]: Oct 29 04:41:15.355 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 29 04:41:15.356848 ignition[802]: INFO : Ignition 2.14.0 Oct 29 04:41:15.356848 ignition[802]: INFO : Stage: mount Oct 29 04:41:15.356848 ignition[802]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:41:15.356848 ignition[802]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:41:15.360736 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:41:15.360736 ignition[802]: INFO : mount: mount passed Oct 29 04:41:15.360736 ignition[802]: INFO : Ignition finished successfully Oct 29 04:41:15.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.359715 systemd[1]: Finished ignition-mount.service. Oct 29 04:41:15.379045 systemd[1]: Finished sysroot-boot.service. Oct 29 04:41:15.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.398529 coreos-metadata[752]: Oct 29 04:41:15.397 INFO Fetch successful Oct 29 04:41:15.398529 coreos-metadata[752]: Oct 29 04:41:15.397 INFO wrote hostname srv-abdzb.gb1.brightbox.com to /sysroot/etc/hostname Oct 29 04:41:15.400456 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 29 04:41:15.400618 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 29 04:41:15.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:15.548525 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 29 04:41:15.559489 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (809) Oct 29 04:41:15.563725 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 04:41:15.563759 kernel: BTRFS info (device vda6): using free space tree Oct 29 04:41:15.563777 kernel: BTRFS info (device vda6): has skinny extents Oct 29 04:41:15.571364 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 29 04:41:15.574034 systemd[1]: Starting ignition-files.service... Oct 29 04:41:15.594563 ignition[829]: INFO : Ignition 2.14.0 Oct 29 04:41:15.594563 ignition[829]: INFO : Stage: files Oct 29 04:41:15.596217 ignition[829]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:41:15.596217 ignition[829]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:41:15.596217 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:41:15.600141 ignition[829]: DEBUG : files: compiled without relabeling support, skipping Oct 29 04:41:15.600141 ignition[829]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 29 04:41:15.600141 ignition[829]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 29 04:41:15.604866 ignition[829]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 29 04:41:15.605960 ignition[829]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 29 04:41:15.607960 unknown[829]: wrote ssh authorized keys file for user: core Oct 29 04:41:15.609000 ignition[829]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 29 04:41:15.609000 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 29 04:41:15.609000 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 29 04:41:15.613186 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 04:41:15.613186 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 04:41:15.613186 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:41:15.613186 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:41:15.613186 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:41:15.613186 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Oct 29 04:41:16.020102 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 29 04:41:16.595766 systemd-networkd[709]: eth0: Gained IPv6LL Oct 29 04:41:17.537995 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:41:17.540285 ignition[829]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 29 04:41:17.541261 ignition[829]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 29 04:41:17.542254 ignition[829]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 29 04:41:17.544478 ignition[829]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 29 04:41:17.550715 ignition[829]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 29 04:41:17.552113 ignition[829]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 29 04:41:17.553406 ignition[829]: INFO : files: files passed Oct 29 04:41:17.553406 ignition[829]: INFO : Ignition finished successfully Oct 29 04:41:17.557340 systemd[1]: Finished ignition-files.service. Oct 29 04:41:17.569894 kernel: kauditd_printk_skb: 28 callbacks suppressed Oct 29 04:41:17.569951 kernel: audit: type=1130 audit(1761712877.557:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.560822 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 29 04:41:17.565454 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 29 04:41:17.566715 systemd[1]: Starting ignition-quench.service... Oct 29 04:41:17.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.580312 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 29 04:41:17.591400 kernel: audit: type=1130 audit(1761712877.580:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.591488 kernel: audit: type=1131 audit(1761712877.580:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.580540 systemd[1]: Finished ignition-quench.service. Oct 29 04:41:17.594217 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 29 04:41:17.596005 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 29 04:41:17.602475 kernel: audit: type=1130 audit(1761712877.596:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.596942 systemd[1]: Reached target ignition-complete.target. Oct 29 04:41:17.604387 systemd[1]: Starting initrd-parse-etc.service... Oct 29 04:41:17.625980 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 29 04:41:17.626130 systemd[1]: Finished initrd-parse-etc.service. Oct 29 04:41:17.637122 kernel: audit: type=1130 audit(1761712877.627:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.637161 kernel: audit: type=1131 audit(1761712877.627:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.627661 systemd[1]: Reached target initrd-fs.target. Oct 29 04:41:17.637771 systemd[1]: Reached target initrd.target. Oct 29 04:41:17.639106 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 29 04:41:17.640451 systemd[1]: Starting dracut-pre-pivot.service... Oct 29 04:41:17.657709 systemd[1]: Finished dracut-pre-pivot.service. Oct 29 04:41:17.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.659718 systemd[1]: Starting initrd-cleanup.service... Oct 29 04:41:17.665801 kernel: audit: type=1130 audit(1761712877.657:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.672694 systemd[1]: Stopped target nss-lookup.target. Oct 29 04:41:17.674184 systemd[1]: Stopped target remote-cryptsetup.target. Oct 29 04:41:17.675763 systemd[1]: Stopped target timers.target. Oct 29 04:41:17.677184 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 29 04:41:17.678162 systemd[1]: Stopped dracut-pre-pivot.service. Oct 29 04:41:17.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.684457 kernel: audit: type=1131 audit(1761712877.679:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.684643 systemd[1]: Stopped target initrd.target. Oct 29 04:41:17.685504 systemd[1]: Stopped target basic.target. Oct 29 04:41:17.686796 systemd[1]: Stopped target ignition-complete.target. Oct 29 04:41:17.688119 systemd[1]: Stopped target ignition-diskful.target. Oct 29 04:41:17.689312 systemd[1]: Stopped target initrd-root-device.target. Oct 29 04:41:17.690585 systemd[1]: Stopped target remote-fs.target. Oct 29 04:41:17.691845 systemd[1]: Stopped target remote-fs-pre.target. Oct 29 04:41:17.693076 systemd[1]: Stopped target sysinit.target. Oct 29 04:41:17.694253 systemd[1]: Stopped target local-fs.target. Oct 29 04:41:17.695357 systemd[1]: Stopped target local-fs-pre.target. Oct 29 04:41:17.696534 systemd[1]: Stopped target swap.target. Oct 29 04:41:17.697729 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 29 04:41:17.722325 kernel: audit: type=1131 audit(1761712877.698:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.697966 systemd[1]: Stopped dracut-pre-mount.service. Oct 29 04:41:17.699126 systemd[1]: Stopped target cryptsetup.target. Oct 29 04:41:17.723385 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 29 04:41:17.730173 kernel: audit: type=1131 audit(1761712877.724:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.723946 systemd[1]: Stopped dracut-initqueue.service. Oct 29 04:41:17.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.725269 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 29 04:41:17.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.725546 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 29 04:41:17.731113 systemd[1]: ignition-files.service: Deactivated successfully. Oct 29 04:41:17.731363 systemd[1]: Stopped ignition-files.service. Oct 29 04:41:17.734392 systemd[1]: Stopping ignition-mount.service... Oct 29 04:41:17.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.737390 systemd[1]: Stopping iscsiuio.service... Oct 29 04:41:17.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.737969 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 29 04:41:17.738177 systemd[1]: Stopped kmod-static-nodes.service. Oct 29 04:41:17.741218 systemd[1]: Stopping sysroot-boot.service... Oct 29 04:41:17.741890 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 29 04:41:17.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.742121 systemd[1]: Stopped systemd-udev-trigger.service. Oct 29 04:41:17.743648 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 29 04:41:17.743857 systemd[1]: Stopped dracut-pre-trigger.service. Oct 29 04:41:17.753481 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 29 04:41:17.755188 systemd[1]: Stopped iscsiuio.service. Oct 29 04:41:17.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.758754 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 29 04:41:17.759661 systemd[1]: Finished initrd-cleanup.service. Oct 29 04:41:17.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.771290 ignition[867]: INFO : Ignition 2.14.0 Oct 29 04:41:17.771290 ignition[867]: INFO : Stage: umount Oct 29 04:41:17.771290 ignition[867]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:41:17.771290 ignition[867]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:41:17.775153 ignition[867]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:41:17.774213 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 29 04:41:17.776894 ignition[867]: INFO : umount: umount passed Oct 29 04:41:17.776894 ignition[867]: INFO : Ignition finished successfully Oct 29 04:41:17.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.777472 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 29 04:41:17.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.777604 systemd[1]: Stopped ignition-mount.service. Oct 29 04:41:17.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.778369 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 29 04:41:17.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.778470 systemd[1]: Stopped ignition-disks.service. Oct 29 04:41:17.779701 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 29 04:41:17.779774 systemd[1]: Stopped ignition-kargs.service. Oct 29 04:41:17.781041 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 29 04:41:17.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.781120 systemd[1]: Stopped ignition-fetch.service. Oct 29 04:41:17.782233 systemd[1]: Stopped target network.target. Oct 29 04:41:17.783499 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 29 04:41:17.784901 systemd[1]: Stopped ignition-fetch-offline.service. Oct 29 04:41:17.786189 systemd[1]: Stopped target paths.target. Oct 29 04:41:17.787493 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 29 04:41:17.792535 systemd[1]: Stopped systemd-ask-password-console.path. Oct 29 04:41:17.793861 systemd[1]: Stopped target slices.target. Oct 29 04:41:17.795142 systemd[1]: Stopped target sockets.target. Oct 29 04:41:17.796562 systemd[1]: iscsid.socket: Deactivated successfully. Oct 29 04:41:17.796621 systemd[1]: Closed iscsid.socket. Oct 29 04:41:17.797740 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 29 04:41:17.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.797830 systemd[1]: Closed iscsiuio.socket. Oct 29 04:41:17.798890 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 29 04:41:17.798975 systemd[1]: Stopped ignition-setup.service. Oct 29 04:41:17.802028 systemd[1]: Stopping systemd-networkd.service... Oct 29 04:41:17.803934 systemd[1]: Stopping systemd-resolved.service... Oct 29 04:41:17.805536 systemd-networkd[709]: eth0: DHCPv6 lease lost Oct 29 04:41:17.807366 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 29 04:41:17.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.807597 systemd[1]: Stopped systemd-networkd.service. Oct 29 04:41:17.809921 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 29 04:41:17.809984 systemd[1]: Closed systemd-networkd.socket. Oct 29 04:41:17.811000 audit: BPF prog-id=9 op=UNLOAD Oct 29 04:41:17.811797 systemd[1]: Stopping network-cleanup.service... Oct 29 04:41:17.814316 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 29 04:41:17.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.814496 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 29 04:41:17.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.818770 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 29 04:41:17.818867 systemd[1]: Stopped systemd-sysctl.service. Oct 29 04:41:17.820138 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 29 04:41:17.820236 systemd[1]: Stopped systemd-modules-load.service. Oct 29 04:41:17.825097 systemd[1]: Stopping systemd-udevd.service... Oct 29 04:41:17.830714 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 29 04:41:17.831648 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 29 04:41:17.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.831842 systemd[1]: Stopped systemd-resolved.service. Oct 29 04:41:17.835000 audit: BPF prog-id=6 op=UNLOAD Oct 29 04:41:17.837873 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 29 04:41:17.839637 systemd[1]: Stopped systemd-udevd.service. Oct 29 04:41:17.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.841764 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 29 04:41:17.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.841902 systemd[1]: Stopped network-cleanup.service. Oct 29 04:41:17.842883 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 29 04:41:17.842957 systemd[1]: Closed systemd-udevd-control.socket. Oct 29 04:41:17.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.844055 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 29 04:41:17.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.844127 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 29 04:41:17.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.845313 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 29 04:41:17.845388 systemd[1]: Stopped dracut-pre-udev.service. Oct 29 04:41:17.846822 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 29 04:41:17.846881 systemd[1]: Stopped dracut-cmdline.service. Oct 29 04:41:17.848053 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 29 04:41:17.848129 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 29 04:41:17.850582 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 29 04:41:17.851295 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 29 04:41:17.851449 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 29 04:41:17.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.862852 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 29 04:41:17.863030 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 29 04:41:17.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.898738 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 29 04:41:17.898922 systemd[1]: Stopped sysroot-boot.service. Oct 29 04:41:17.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.900477 systemd[1]: Reached target initrd-switch-root.target. Oct 29 04:41:17.901523 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 29 04:41:17.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:17.901601 systemd[1]: Stopped initrd-setup-root.service. Oct 29 04:41:17.903797 systemd[1]: Starting initrd-switch-root.service... Oct 29 04:41:17.919667 systemd[1]: Switching root. Oct 29 04:41:17.943389 iscsid[714]: iscsid shutting down. Oct 29 04:41:17.944326 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Oct 29 04:41:17.944441 systemd-journald[201]: Journal stopped Oct 29 04:41:22.596110 kernel: SELinux: Class mctp_socket not defined in policy. Oct 29 04:41:22.596204 kernel: SELinux: Class anon_inode not defined in policy. Oct 29 04:41:22.596229 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 29 04:41:22.596249 kernel: SELinux: policy capability network_peer_controls=1 Oct 29 04:41:22.596280 kernel: SELinux: policy capability open_perms=1 Oct 29 04:41:22.596315 kernel: SELinux: policy capability extended_socket_class=1 Oct 29 04:41:22.596338 kernel: SELinux: policy capability always_check_network=0 Oct 29 04:41:22.596364 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 29 04:41:22.596396 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 29 04:41:22.596463 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 29 04:41:22.596493 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 29 04:41:22.596520 systemd[1]: Successfully loaded SELinux policy in 83.163ms. Oct 29 04:41:22.596557 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.415ms. Oct 29 04:41:22.596580 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 04:41:22.596603 systemd[1]: Detected virtualization kvm. Oct 29 04:41:22.596623 systemd[1]: Detected architecture x86-64. Oct 29 04:41:22.596654 systemd[1]: Detected first boot. Oct 29 04:41:22.596676 systemd[1]: Hostname set to . Oct 29 04:41:22.596696 systemd[1]: Initializing machine ID from VM UUID. Oct 29 04:41:22.596719 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 29 04:41:22.596753 systemd[1]: Populated /etc with preset unit settings. Oct 29 04:41:22.596783 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 04:41:22.596810 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 04:41:22.596853 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 04:41:22.596876 systemd[1]: iscsid.service: Deactivated successfully. Oct 29 04:41:22.596957 systemd[1]: Stopped iscsid.service. Oct 29 04:41:22.596981 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 29 04:41:22.597001 systemd[1]: Stopped initrd-switch-root.service. Oct 29 04:41:22.597021 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 29 04:41:22.597041 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 29 04:41:22.597074 systemd[1]: Created slice system-addon\x2drun.slice. Oct 29 04:41:22.597096 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 29 04:41:22.597116 systemd[1]: Created slice system-getty.slice. Oct 29 04:41:22.597136 systemd[1]: Created slice system-modprobe.slice. Oct 29 04:41:22.597156 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 29 04:41:22.597176 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 29 04:41:22.597209 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 29 04:41:22.597254 systemd[1]: Created slice user.slice. Oct 29 04:41:22.597277 systemd[1]: Started systemd-ask-password-console.path. Oct 29 04:41:22.597297 systemd[1]: Started systemd-ask-password-wall.path. Oct 29 04:41:22.597327 systemd[1]: Set up automount boot.automount. Oct 29 04:41:22.597363 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 29 04:41:22.597390 systemd[1]: Stopped target initrd-switch-root.target. Oct 29 04:41:22.605545 systemd[1]: Stopped target initrd-fs.target. Oct 29 04:41:22.605606 systemd[1]: Stopped target initrd-root-fs.target. Oct 29 04:41:22.605629 systemd[1]: Reached target integritysetup.target. Oct 29 04:41:22.605650 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 04:41:22.605672 systemd[1]: Reached target remote-fs.target. Oct 29 04:41:22.605693 systemd[1]: Reached target slices.target. Oct 29 04:41:22.605713 systemd[1]: Reached target swap.target. Oct 29 04:41:22.605733 systemd[1]: Reached target torcx.target. Oct 29 04:41:22.605761 systemd[1]: Reached target veritysetup.target. Oct 29 04:41:22.605783 systemd[1]: Listening on systemd-coredump.socket. Oct 29 04:41:22.605813 systemd[1]: Listening on systemd-initctl.socket. Oct 29 04:41:22.605843 systemd[1]: Listening on systemd-networkd.socket. Oct 29 04:41:22.605872 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 04:41:22.605900 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 04:41:22.605921 systemd[1]: Listening on systemd-userdbd.socket. Oct 29 04:41:22.605942 systemd[1]: Mounting dev-hugepages.mount... Oct 29 04:41:22.605962 systemd[1]: Mounting dev-mqueue.mount... Oct 29 04:41:22.605982 systemd[1]: Mounting media.mount... Oct 29 04:41:22.606007 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:41:22.606027 systemd[1]: Mounting sys-kernel-debug.mount... Oct 29 04:41:22.606760 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 29 04:41:22.606825 systemd[1]: Mounting tmp.mount... Oct 29 04:41:22.606848 systemd[1]: Starting flatcar-tmpfiles.service... Oct 29 04:41:22.606869 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:41:22.606889 systemd[1]: Starting kmod-static-nodes.service... Oct 29 04:41:22.607011 systemd[1]: Starting modprobe@configfs.service... Oct 29 04:41:22.607038 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:41:22.607066 systemd[1]: Starting modprobe@drm.service... Oct 29 04:41:22.607087 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:41:22.607107 systemd[1]: Starting modprobe@fuse.service... Oct 29 04:41:22.607290 systemd[1]: Starting modprobe@loop.service... Oct 29 04:41:22.607360 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 29 04:41:22.607512 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 29 04:41:22.607547 systemd[1]: Stopped systemd-fsck-root.service. Oct 29 04:41:22.607578 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 29 04:41:22.607607 systemd[1]: Stopped systemd-fsck-usr.service. Oct 29 04:41:22.607629 systemd[1]: Stopped systemd-journald.service. Oct 29 04:41:22.607649 kernel: fuse: init (API version 7.34) Oct 29 04:41:22.607936 systemd[1]: Starting systemd-journald.service... Oct 29 04:41:22.607960 systemd[1]: Starting systemd-modules-load.service... Oct 29 04:41:22.607980 systemd[1]: Starting systemd-network-generator.service... Oct 29 04:41:22.608000 systemd[1]: Starting systemd-remount-fs.service... Oct 29 04:41:22.608213 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 04:41:22.608244 systemd[1]: verity-setup.service: Deactivated successfully. Oct 29 04:41:22.608264 systemd[1]: Stopped verity-setup.service. Oct 29 04:41:22.608290 kernel: kauditd_printk_skb: 67 callbacks suppressed Oct 29 04:41:22.608323 kernel: audit: type=1131 audit(1761712882.579:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.608346 kernel: loop: module loaded Oct 29 04:41:22.608366 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:41:22.608574 kernel: audit: type=1305 audit(1761712882.593:110): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 29 04:41:22.608602 kernel: audit: type=1300 audit(1761712882.593:110): arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffee4a5b660 a2=4000 a3=7ffee4a5b6fc items=0 ppid=1 pid=970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:22.608622 systemd[1]: Mounted dev-hugepages.mount. Oct 29 04:41:22.608665 systemd-journald[970]: Journal started Oct 29 04:41:22.609504 systemd-journald[970]: Runtime Journal (/run/log/journal/8fe92679c0694174be04cd25dbd928d9) is 4.7M, max 38.1M, 33.3M free. Oct 29 04:41:18.143000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 29 04:41:18.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 04:41:18.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 04:41:18.217000 audit: BPF prog-id=10 op=LOAD Oct 29 04:41:18.217000 audit: BPF prog-id=10 op=UNLOAD Oct 29 04:41:18.217000 audit: BPF prog-id=11 op=LOAD Oct 29 04:41:18.217000 audit: BPF prog-id=11 op=UNLOAD Oct 29 04:41:18.348000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 29 04:41:18.348000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858bc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:18.348000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 04:41:18.351000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 29 04:41:18.351000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000185995 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:18.351000 audit: CWD cwd="/" Oct 29 04:41:18.351000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:18.351000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:18.351000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 04:41:22.359000 audit: BPF prog-id=12 op=LOAD Oct 29 04:41:22.359000 audit: BPF prog-id=3 op=UNLOAD Oct 29 04:41:22.359000 audit: BPF prog-id=13 op=LOAD Oct 29 04:41:22.359000 audit: BPF prog-id=14 op=LOAD Oct 29 04:41:22.359000 audit: BPF prog-id=4 op=UNLOAD Oct 29 04:41:22.359000 audit: BPF prog-id=5 op=UNLOAD Oct 29 04:41:22.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.371000 audit: BPF prog-id=12 op=UNLOAD Oct 29 04:41:22.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.540000 audit: BPF prog-id=15 op=LOAD Oct 29 04:41:22.541000 audit: BPF prog-id=16 op=LOAD Oct 29 04:41:22.541000 audit: BPF prog-id=17 op=LOAD Oct 29 04:41:22.541000 audit: BPF prog-id=13 op=UNLOAD Oct 29 04:41:22.541000 audit: BPF prog-id=14 op=UNLOAD Oct 29 04:41:22.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.593000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 29 04:41:22.593000 audit[970]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffee4a5b660 a2=4000 a3=7ffee4a5b6fc items=0 ppid=1 pid=970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:18.345446 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 04:41:22.354814 systemd[1]: Queued start job for default target multi-user.target. Oct 29 04:41:18.346199 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 04:41:22.354848 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 29 04:41:18.346274 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 04:41:22.362443 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 29 04:41:22.612428 systemd[1]: Started systemd-journald.service. Oct 29 04:41:18.346329 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 29 04:41:18.346347 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 29 04:41:18.346443 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 29 04:41:22.593000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 29 04:41:18.346468 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 29 04:41:18.346799 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 29 04:41:18.346871 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 04:41:18.346904 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 04:41:18.347638 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 29 04:41:18.347706 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 29 04:41:18.347748 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 29 04:41:18.347774 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 29 04:41:18.347815 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 29 04:41:18.347852 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 29 04:41:21.752030 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:41:21.752690 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:41:22.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:21.752943 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:41:21.753400 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:41:21.753536 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 29 04:41:21.753716 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:41:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 29 04:41:22.636032 kernel: audit: type=1327 audit(1761712882.593:110): proctitle="/usr/lib/systemd/systemd-journald" Oct 29 04:41:22.636120 kernel: audit: type=1130 audit(1761712882.612:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.621775 systemd[1]: Mounted dev-mqueue.mount. Oct 29 04:41:22.622600 systemd[1]: Mounted media.mount. Oct 29 04:41:22.636861 systemd[1]: Mounted sys-kernel-debug.mount. Oct 29 04:41:22.638272 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 29 04:41:22.640610 systemd[1]: Mounted tmp.mount. Oct 29 04:41:22.641610 systemd[1]: Finished kmod-static-nodes.service. Oct 29 04:41:22.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.647836 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 29 04:41:22.648069 systemd[1]: Finished modprobe@configfs.service. Oct 29 04:41:22.648508 kernel: audit: type=1130 audit(1761712882.641:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.649087 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:41:22.649293 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:41:22.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.654918 kernel: audit: type=1130 audit(1761712882.648:113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.654982 kernel: audit: type=1131 audit(1761712882.648:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.667448 kernel: audit: type=1130 audit(1761712882.661:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.667502 kernel: audit: type=1131 audit(1761712882.666:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.672831 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 04:41:22.673055 systemd[1]: Finished modprobe@drm.service. Oct 29 04:41:22.674969 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:41:22.675211 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:41:22.676252 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 29 04:41:22.676635 systemd[1]: Finished modprobe@fuse.service. Oct 29 04:41:22.677675 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 04:41:22.677893 systemd[1]: Finished modprobe@loop.service. Oct 29 04:41:22.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.691450 systemd[1]: Finished systemd-modules-load.service. Oct 29 04:41:22.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.693033 systemd[1]: Finished systemd-network-generator.service. Oct 29 04:41:22.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.696174 systemd[1]: Finished systemd-remount-fs.service. Oct 29 04:41:22.697695 systemd[1]: Reached target network-pre.target. Oct 29 04:41:22.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.700380 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 29 04:41:22.703854 systemd[1]: Mounting sys-kernel-config.mount... Oct 29 04:41:22.704934 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 29 04:41:22.709998 systemd[1]: Starting systemd-hwdb-update.service... Oct 29 04:41:22.712481 systemd[1]: Starting systemd-journal-flush.service... Oct 29 04:41:22.713356 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:41:22.716933 systemd[1]: Starting systemd-random-seed.service... Oct 29 04:41:22.718133 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 04:41:22.720903 systemd[1]: Starting systemd-sysctl.service... Oct 29 04:41:22.728772 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 29 04:41:22.729634 systemd[1]: Mounted sys-kernel-config.mount. Oct 29 04:41:22.739586 systemd-journald[970]: Time spent on flushing to /var/log/journal/8fe92679c0694174be04cd25dbd928d9 is 42.696ms for 1277 entries. Oct 29 04:41:22.739586 systemd-journald[970]: System Journal (/var/log/journal/8fe92679c0694174be04cd25dbd928d9) is 8.0M, max 584.8M, 576.8M free. Oct 29 04:41:22.803801 systemd-journald[970]: Received client request to flush runtime journal. Oct 29 04:41:22.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.749008 systemd[1]: Finished systemd-random-seed.service. Oct 29 04:41:22.749864 systemd[1]: Reached target first-boot-complete.target. Oct 29 04:41:22.762840 systemd[1]: Finished systemd-sysctl.service. Oct 29 04:41:22.773357 systemd[1]: Finished flatcar-tmpfiles.service. Oct 29 04:41:22.775922 systemd[1]: Starting systemd-sysusers.service... Oct 29 04:41:22.805695 systemd[1]: Finished systemd-journal-flush.service. Oct 29 04:41:22.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.825794 systemd[1]: Finished systemd-sysusers.service. Oct 29 04:41:22.871831 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 04:41:22.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:22.874520 systemd[1]: Starting systemd-udev-settle.service... Oct 29 04:41:22.885556 udevadm[1010]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 29 04:41:23.497370 systemd[1]: Finished systemd-hwdb-update.service. Oct 29 04:41:23.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:23.504000 audit: BPF prog-id=18 op=LOAD Oct 29 04:41:23.504000 audit: BPF prog-id=19 op=LOAD Oct 29 04:41:23.504000 audit: BPF prog-id=7 op=UNLOAD Oct 29 04:41:23.504000 audit: BPF prog-id=8 op=UNLOAD Oct 29 04:41:23.506045 systemd[1]: Starting systemd-udevd.service... Oct 29 04:41:23.533540 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Oct 29 04:41:23.565108 systemd[1]: Started systemd-udevd.service. Oct 29 04:41:23.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:23.569000 audit: BPF prog-id=20 op=LOAD Oct 29 04:41:23.572334 systemd[1]: Starting systemd-networkd.service... Oct 29 04:41:23.579000 audit: BPF prog-id=21 op=LOAD Oct 29 04:41:23.579000 audit: BPF prog-id=22 op=LOAD Oct 29 04:41:23.579000 audit: BPF prog-id=23 op=LOAD Oct 29 04:41:23.581658 systemd[1]: Starting systemd-userdbd.service... Oct 29 04:41:23.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:23.637748 systemd[1]: Started systemd-userdbd.service. Oct 29 04:41:23.675203 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 29 04:41:23.726273 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 04:41:23.771571 systemd-networkd[1020]: lo: Link UP Oct 29 04:41:23.771585 systemd-networkd[1020]: lo: Gained carrier Oct 29 04:41:23.777894 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 29 04:41:23.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:23.774662 systemd-networkd[1020]: Enumeration completed Oct 29 04:41:23.774839 systemd-networkd[1020]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 04:41:23.776849 systemd[1]: Started systemd-networkd.service. Oct 29 04:41:23.777138 systemd-networkd[1020]: eth0: Link UP Oct 29 04:41:23.777166 systemd-networkd[1020]: eth0: Gained carrier Oct 29 04:41:23.793589 systemd-networkd[1020]: eth0: DHCPv4 address 10.243.77.174/30, gateway 10.243.77.173 acquired from 10.243.77.173 Oct 29 04:41:23.819440 kernel: mousedev: PS/2 mouse device common for all mice Oct 29 04:41:23.829450 kernel: ACPI: button: Power Button [PWRF] Oct 29 04:41:23.859000 audit[1017]: AVC avc: denied { confidentiality } for pid=1017 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 29 04:41:23.859000 audit[1017]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f930140080 a1=338ec a2=7f42eb345bc5 a3=5 items=110 ppid=1011 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:23.859000 audit: CWD cwd="/" Oct 29 04:41:23.859000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=1 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=2 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=3 name=(null) inode=15600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=4 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=5 name=(null) inode=15601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=6 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=7 name=(null) inode=15602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=8 name=(null) inode=15602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=9 name=(null) inode=15603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=10 name=(null) inode=15602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=11 name=(null) inode=15604 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=12 name=(null) inode=15602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=13 name=(null) inode=15605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=14 name=(null) inode=15602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=15 name=(null) inode=15606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=16 name=(null) inode=15602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=17 name=(null) inode=15607 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=18 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=19 name=(null) inode=15608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=20 name=(null) inode=15608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=21 name=(null) inode=15609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=22 name=(null) inode=15608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=23 name=(null) inode=15610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=24 name=(null) inode=15608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=25 name=(null) inode=15611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=26 name=(null) inode=15608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=27 name=(null) inode=15612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=28 name=(null) inode=15608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=29 name=(null) inode=15613 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=30 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=31 name=(null) inode=15614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=32 name=(null) inode=15614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=33 name=(null) inode=15615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=34 name=(null) inode=15614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=35 name=(null) inode=15616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=36 name=(null) inode=15614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=37 name=(null) inode=15617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=38 name=(null) inode=15614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=39 name=(null) inode=15618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=40 name=(null) inode=15614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=41 name=(null) inode=15619 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=42 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=43 name=(null) inode=15620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=44 name=(null) inode=15620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=45 name=(null) inode=15621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=46 name=(null) inode=15620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=47 name=(null) inode=15622 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=48 name=(null) inode=15620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=49 name=(null) inode=15623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=50 name=(null) inode=15620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=51 name=(null) inode=15624 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=52 name=(null) inode=15620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=53 name=(null) inode=15625 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=55 name=(null) inode=15626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=56 name=(null) inode=15626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=57 name=(null) inode=15627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=58 name=(null) inode=15626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=59 name=(null) inode=15628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=60 name=(null) inode=15626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=61 name=(null) inode=15629 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=62 name=(null) inode=15629 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=63 name=(null) inode=15630 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=64 name=(null) inode=15629 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=65 name=(null) inode=15631 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=66 name=(null) inode=15629 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=67 name=(null) inode=15632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=68 name=(null) inode=15629 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=69 name=(null) inode=15633 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=70 name=(null) inode=15629 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=71 name=(null) inode=15634 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=72 name=(null) inode=15626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=73 name=(null) inode=15635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=74 name=(null) inode=15635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=75 name=(null) inode=15636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=76 name=(null) inode=15635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=77 name=(null) inode=15637 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=78 name=(null) inode=15635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=79 name=(null) inode=15638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=80 name=(null) inode=15635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=81 name=(null) inode=15639 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=82 name=(null) inode=15635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=83 name=(null) inode=15640 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=84 name=(null) inode=15626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=85 name=(null) inode=15641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=86 name=(null) inode=15641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=87 name=(null) inode=15642 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=88 name=(null) inode=15641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=89 name=(null) inode=15643 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=90 name=(null) inode=15641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=91 name=(null) inode=15644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=92 name=(null) inode=15641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=93 name=(null) inode=15645 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=94 name=(null) inode=15641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=95 name=(null) inode=15646 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=96 name=(null) inode=15626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=97 name=(null) inode=15647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=98 name=(null) inode=15647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=99 name=(null) inode=15648 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=100 name=(null) inode=15647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=101 name=(null) inode=15649 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=102 name=(null) inode=15647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=103 name=(null) inode=15650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=104 name=(null) inode=15647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=105 name=(null) inode=15651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=106 name=(null) inode=15647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=107 name=(null) inode=15652 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PATH item=109 name=(null) inode=15653 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:23.859000 audit: PROCTITLE proctitle="(udev-worker)" Oct 29 04:41:23.890497 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 29 04:41:23.895449 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 29 04:41:23.915108 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 29 04:41:23.915449 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 29 04:41:24.094238 systemd[1]: Finished systemd-udev-settle.service. Oct 29 04:41:24.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.097478 systemd[1]: Starting lvm2-activation-early.service... Oct 29 04:41:24.122658 lvm[1040]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 04:41:24.154041 systemd[1]: Finished lvm2-activation-early.service. Oct 29 04:41:24.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.154991 systemd[1]: Reached target cryptsetup.target. Oct 29 04:41:24.157604 systemd[1]: Starting lvm2-activation.service... Oct 29 04:41:24.162955 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 04:41:24.193881 systemd[1]: Finished lvm2-activation.service. Oct 29 04:41:24.194766 systemd[1]: Reached target local-fs-pre.target. Oct 29 04:41:24.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.195441 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 29 04:41:24.195481 systemd[1]: Reached target local-fs.target. Oct 29 04:41:24.196094 systemd[1]: Reached target machines.target. Oct 29 04:41:24.198524 systemd[1]: Starting ldconfig.service... Oct 29 04:41:24.199892 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:41:24.199976 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:41:24.201799 systemd[1]: Starting systemd-boot-update.service... Oct 29 04:41:24.205544 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 29 04:41:24.210348 systemd[1]: Starting systemd-machine-id-commit.service... Oct 29 04:41:24.215876 systemd[1]: Starting systemd-sysext.service... Oct 29 04:41:24.217598 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) Oct 29 04:41:24.222952 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 29 04:41:24.243259 systemd[1]: Unmounting usr-share-oem.mount... Oct 29 04:41:24.247181 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 29 04:41:24.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.339149 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 29 04:41:24.339481 systemd[1]: Unmounted usr-share-oem.mount. Oct 29 04:41:24.388571 kernel: loop0: detected capacity change from 0 to 224512 Oct 29 04:41:24.390749 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 29 04:41:24.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.391563 systemd[1]: Finished systemd-machine-id-commit.service. Oct 29 04:41:24.416517 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 29 04:41:24.440744 kernel: loop1: detected capacity change from 0 to 224512 Oct 29 04:41:24.452817 (sd-sysext)[1055]: Using extensions 'kubernetes'. Oct 29 04:41:24.454454 (sd-sysext)[1055]: Merged extensions into '/usr'. Oct 29 04:41:24.485372 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:41:24.488703 systemd[1]: Mounting usr-share-oem.mount... Oct 29 04:41:24.492917 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:41:24.498084 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:41:24.502293 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:41:24.509445 systemd[1]: Starting modprobe@loop.service... Oct 29 04:41:24.510841 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:41:24.511088 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:41:24.511288 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:41:24.514913 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:41:24.515841 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:41:24.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.517726 systemd-fsck[1052]: fsck.fat 4.2 (2021-01-31) Oct 29 04:41:24.517726 systemd-fsck[1052]: /dev/vda1: 790 files, 120772/258078 clusters Oct 29 04:41:24.518316 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:41:24.518558 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:41:24.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.521093 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 04:41:24.521288 systemd[1]: Finished modprobe@loop.service. Oct 29 04:41:24.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.524311 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:41:24.524493 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 04:41:24.527133 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 29 04:41:24.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.533694 systemd[1]: Mounted usr-share-oem.mount. Oct 29 04:41:24.535802 systemd[1]: Finished systemd-sysext.service. Oct 29 04:41:24.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:24.542884 systemd[1]: Mounting boot.mount... Oct 29 04:41:24.545154 systemd[1]: Starting ensure-sysext.service... Oct 29 04:41:24.552362 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 29 04:41:24.563817 systemd[1]: Mounted boot.mount. Oct 29 04:41:24.575490 systemd[1]: Reloading. Oct 29 04:41:24.617804 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 29 04:41:24.624996 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 29 04:41:24.639432 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 29 04:41:24.781542 /usr/lib/systemd/system-generators/torcx-generator[1082]: time="2025-10-29T04:41:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 04:41:24.781599 /usr/lib/systemd/system-generators/torcx-generator[1082]: time="2025-10-29T04:41:24Z" level=info msg="torcx already run" Oct 29 04:41:24.837897 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 29 04:41:24.944526 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 04:41:24.944572 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 04:41:24.972267 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 04:41:25.039957 systemd-networkd[1020]: eth0: Gained IPv6LL Oct 29 04:41:25.056000 audit: BPF prog-id=24 op=LOAD Oct 29 04:41:25.056000 audit: BPF prog-id=25 op=LOAD Oct 29 04:41:25.056000 audit: BPF prog-id=18 op=UNLOAD Oct 29 04:41:25.056000 audit: BPF prog-id=19 op=UNLOAD Oct 29 04:41:25.058000 audit: BPF prog-id=26 op=LOAD Oct 29 04:41:25.059000 audit: BPF prog-id=15 op=UNLOAD Oct 29 04:41:25.059000 audit: BPF prog-id=27 op=LOAD Oct 29 04:41:25.059000 audit: BPF prog-id=28 op=LOAD Oct 29 04:41:25.059000 audit: BPF prog-id=16 op=UNLOAD Oct 29 04:41:25.059000 audit: BPF prog-id=17 op=UNLOAD Oct 29 04:41:25.060000 audit: BPF prog-id=29 op=LOAD Oct 29 04:41:25.060000 audit: BPF prog-id=20 op=UNLOAD Oct 29 04:41:25.061000 audit: BPF prog-id=30 op=LOAD Oct 29 04:41:25.061000 audit: BPF prog-id=21 op=UNLOAD Oct 29 04:41:25.062000 audit: BPF prog-id=31 op=LOAD Oct 29 04:41:25.062000 audit: BPF prog-id=32 op=LOAD Oct 29 04:41:25.062000 audit: BPF prog-id=22 op=UNLOAD Oct 29 04:41:25.062000 audit: BPF prog-id=23 op=UNLOAD Oct 29 04:41:25.067116 systemd[1]: Finished ldconfig.service. Oct 29 04:41:25.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.068293 systemd[1]: Finished systemd-boot-update.service. Oct 29 04:41:25.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.070561 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 29 04:41:25.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.076306 systemd[1]: Starting audit-rules.service... Oct 29 04:41:25.078999 systemd[1]: Starting clean-ca-certificates.service... Oct 29 04:41:25.082234 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 29 04:41:25.084000 audit: BPF prog-id=33 op=LOAD Oct 29 04:41:25.088000 audit: BPF prog-id=34 op=LOAD Oct 29 04:41:25.086991 systemd[1]: Starting systemd-resolved.service... Oct 29 04:41:25.091314 systemd[1]: Starting systemd-timesyncd.service... Oct 29 04:41:25.093862 systemd[1]: Starting systemd-update-utmp.service... Oct 29 04:41:25.114000 audit[1136]: SYSTEM_BOOT pid=1136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.104047 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.106052 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:41:25.108808 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:41:25.112819 systemd[1]: Starting modprobe@loop.service... Oct 29 04:41:25.113560 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.113772 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:41:25.115750 systemd[1]: Finished clean-ca-certificates.service. Oct 29 04:41:25.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.118669 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:41:25.118894 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:41:25.120283 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:41:25.120503 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:41:25.126045 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:41:25.126305 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 04:41:25.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.128542 systemd[1]: Finished systemd-update-utmp.service. Oct 29 04:41:25.132928 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.134902 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:41:25.138991 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:41:25.139723 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.139870 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:41:25.140034 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 04:41:25.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.142915 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:41:25.143134 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:41:25.144402 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:41:25.144692 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:41:25.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.146960 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:41:25.152299 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.154553 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:41:25.159610 systemd[1]: Starting modprobe@drm.service... Oct 29 04:41:25.163681 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:41:25.165571 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.165771 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:41:25.168665 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 29 04:41:25.169567 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 04:41:25.171536 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 04:41:25.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.172482 systemd[1]: Finished modprobe@loop.service. Oct 29 04:41:25.174194 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 04:41:25.174418 systemd[1]: Finished modprobe@drm.service. Oct 29 04:41:25.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.175959 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:41:25.176132 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:41:25.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.179233 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 29 04:41:25.180641 systemd[1]: Finished ensure-sysext.service. Oct 29 04:41:25.182884 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:41:25.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.186420 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:41:25.186611 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:41:25.187404 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.190406 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 29 04:41:25.192931 systemd[1]: Starting systemd-update-done.service... Oct 29 04:41:25.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:25.204349 systemd[1]: Finished systemd-update-done.service. Oct 29 04:41:25.233000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 29 04:41:25.233000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe96afd490 a2=420 a3=0 items=0 ppid=1130 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:25.233000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 29 04:41:25.234929 augenrules[1160]: No rules Oct 29 04:41:25.235736 systemd[1]: Finished audit-rules.service. Oct 29 04:41:25.245289 systemd[1]: Started systemd-timesyncd.service. Oct 29 04:41:25.246098 systemd[1]: Reached target time-set.target. Oct 29 04:41:25.261275 systemd-resolved[1134]: Positive Trust Anchors: Oct 29 04:41:25.261297 systemd-resolved[1134]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 04:41:25.261335 systemd-resolved[1134]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 04:41:25.269609 systemd-resolved[1134]: Using system hostname 'srv-abdzb.gb1.brightbox.com'. Oct 29 04:41:25.272269 systemd[1]: Started systemd-resolved.service. Oct 29 04:41:25.273128 systemd[1]: Reached target network.target. Oct 29 04:41:25.273748 systemd[1]: Reached target network-online.target. Oct 29 04:41:25.274393 systemd[1]: Reached target nss-lookup.target. Oct 29 04:41:25.275048 systemd[1]: Reached target sysinit.target. Oct 29 04:41:25.275769 systemd[1]: Started motdgen.path. Oct 29 04:41:25.276487 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 29 04:41:25.277419 systemd[1]: Started logrotate.timer. Oct 29 04:41:25.278121 systemd[1]: Started mdadm.timer. Oct 29 04:41:25.278699 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 29 04:41:25.279321 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 29 04:41:25.279372 systemd[1]: Reached target paths.target. Oct 29 04:41:25.279943 systemd[1]: Reached target timers.target. Oct 29 04:41:25.281046 systemd[1]: Listening on dbus.socket. Oct 29 04:41:25.283649 systemd[1]: Starting docker.socket... Oct 29 04:41:25.288114 systemd[1]: Listening on sshd.socket. Oct 29 04:41:25.288881 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:41:25.289468 systemd[1]: Listening on docker.socket. Oct 29 04:41:25.290168 systemd[1]: Reached target sockets.target. Oct 29 04:41:25.290795 systemd[1]: Reached target basic.target. Oct 29 04:41:25.291451 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.291500 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 04:41:25.292916 systemd[1]: Starting containerd.service... Oct 29 04:41:25.295024 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 29 04:41:25.301393 systemd[1]: Starting dbus.service... Oct 29 04:41:25.304202 systemd[1]: Starting enable-oem-cloudinit.service... Oct 29 04:41:25.308301 systemd[1]: Starting extend-filesystems.service... Oct 29 04:41:25.309117 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 29 04:41:25.312173 systemd[1]: Starting kubelet.service... Oct 29 04:41:25.316965 systemd[1]: Starting motdgen.service... Oct 29 04:41:25.321681 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 29 04:41:25.324312 systemd[1]: Starting sshd-keygen.service... Oct 29 04:41:25.331845 jq[1172]: false Oct 29 04:41:25.333672 systemd[1]: Starting systemd-logind.service... Oct 29 04:41:25.334378 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:41:25.334530 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 29 04:41:25.338985 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 29 04:41:25.341092 systemd[1]: Starting update-engine.service... Oct 29 04:41:25.343316 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 29 04:41:25.348238 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 29 04:41:25.348920 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 29 04:41:25.355766 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:41:25.355847 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:41:25.379933 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 29 04:41:25.380231 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 29 04:41:25.383111 jq[1185]: true Oct 29 04:41:25.413479 jq[1192]: true Oct 29 04:41:25.428636 dbus-daemon[1170]: [system] SELinux support is enabled Oct 29 04:41:25.433263 systemd[1]: Started dbus.service. Oct 29 04:41:25.436964 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 29 04:41:25.437037 systemd[1]: Reached target system-config.target. Oct 29 04:41:25.437709 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 29 04:41:25.437741 systemd[1]: Reached target user-config.target. Oct 29 04:41:25.444511 dbus-daemon[1170]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1020 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 29 04:41:25.451361 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 29 04:41:25.458165 extend-filesystems[1174]: Found loop1 Oct 29 04:41:25.459521 extend-filesystems[1174]: Found vda Oct 29 04:41:25.460836 extend-filesystems[1174]: Found vda1 Oct 29 04:41:25.460836 extend-filesystems[1174]: Found vda2 Oct 29 04:41:25.460836 extend-filesystems[1174]: Found vda3 Oct 29 04:41:25.460836 extend-filesystems[1174]: Found usr Oct 29 04:41:25.460836 extend-filesystems[1174]: Found vda4 Oct 29 04:41:25.460836 extend-filesystems[1174]: Found vda6 Oct 29 04:41:25.460836 extend-filesystems[1174]: Found vda7 Oct 29 04:41:25.460836 extend-filesystems[1174]: Found vda9 Oct 29 04:41:25.460836 extend-filesystems[1174]: Checking size of /dev/vda9 Oct 29 04:41:26.289786 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Oct 29 04:41:26.289900 bash[1220]: Updated "/home/core/.ssh/authorized_keys" Oct 29 04:41:25.463847 systemd[1]: Starting systemd-hostnamed.service... Oct 29 04:41:26.293795 update_engine[1183]: I1029 04:41:26.246336 1183 main.cc:92] Flatcar Update Engine starting Oct 29 04:41:26.293795 update_engine[1183]: I1029 04:41:26.259519 1183 update_check_scheduler.cc:74] Next update check in 7m3s Oct 29 04:41:26.294178 extend-filesystems[1174]: Resized partition /dev/vda9 Oct 29 04:41:26.228920 systemd-resolved[1134]: Clock change detected. Flushing caches. Oct 29 04:41:26.295642 extend-filesystems[1223]: resize2fs 1.46.5 (30-Dec-2021) Oct 29 04:41:26.229110 systemd-timesyncd[1135]: Contacted time server 194.146.161.122:123 (0.flatcar.pool.ntp.org). Oct 29 04:41:26.229194 systemd-timesyncd[1135]: Initial clock synchronization to Wed 2025-10-29 04:41:26.228855 UTC. Oct 29 04:41:26.236947 systemd[1]: motdgen.service: Deactivated successfully. Oct 29 04:41:26.237220 systemd[1]: Finished motdgen.service. Oct 29 04:41:26.254238 systemd[1]: Started update-engine.service. Oct 29 04:41:26.257905 systemd[1]: Started locksmithd.service. Oct 29 04:41:26.266003 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 29 04:41:26.403121 systemd-logind[1179]: Watching system buttons on /dev/input/event2 (Power Button) Oct 29 04:41:26.403790 systemd-logind[1179]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 29 04:41:26.404600 systemd-logind[1179]: New seat seat0. Oct 29 04:41:26.415704 systemd[1]: Started systemd-logind.service. Oct 29 04:41:26.461206 env[1189]: time="2025-10-29T04:41:26.460970548Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 29 04:41:26.512708 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 29 04:41:26.513626 systemd[1]: Started systemd-hostnamed.service. Oct 29 04:41:26.519013 dbus-daemon[1170]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1205 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 29 04:41:26.523910 systemd[1]: Starting polkit.service... Oct 29 04:41:26.528711 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Oct 29 04:41:26.550418 extend-filesystems[1223]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 29 04:41:26.550418 extend-filesystems[1223]: old_desc_blocks = 1, new_desc_blocks = 8 Oct 29 04:41:26.550418 extend-filesystems[1223]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Oct 29 04:41:26.553900 extend-filesystems[1174]: Resized filesystem in /dev/vda9 Oct 29 04:41:26.551743 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 29 04:41:26.552096 systemd[1]: Finished extend-filesystems.service. Oct 29 04:41:26.577150 polkitd[1229]: Started polkitd version 121 Oct 29 04:41:26.596785 env[1189]: time="2025-10-29T04:41:26.596720895Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 29 04:41:26.598853 env[1189]: time="2025-10-29T04:41:26.598817792Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:41:26.602525 polkitd[1229]: Loading rules from directory /etc/polkit-1/rules.d Oct 29 04:41:26.605738 env[1189]: time="2025-10-29T04:41:26.605652575Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 29 04:41:26.605883 env[1189]: time="2025-10-29T04:41:26.605852965Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:41:26.606334 env[1189]: time="2025-10-29T04:41:26.606298271Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 04:41:26.606543 env[1189]: time="2025-10-29T04:41:26.606511146Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 29 04:41:26.606732 env[1189]: time="2025-10-29T04:41:26.606699990Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 29 04:41:26.606877 env[1189]: time="2025-10-29T04:41:26.606848991Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 29 04:41:26.607227 env[1189]: time="2025-10-29T04:41:26.607197473Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:41:26.608006 env[1189]: time="2025-10-29T04:41:26.607975143Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:41:26.608307 env[1189]: time="2025-10-29T04:41:26.608272327Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 04:41:26.609007 polkitd[1229]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 29 04:41:26.609176 env[1189]: time="2025-10-29T04:41:26.609145456Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 29 04:41:26.609420 env[1189]: time="2025-10-29T04:41:26.609389055Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 29 04:41:26.609670 env[1189]: time="2025-10-29T04:41:26.609640885Z" level=info msg="metadata content store policy set" policy=shared Oct 29 04:41:26.612566 polkitd[1229]: Finished loading, compiling and executing 2 rules Oct 29 04:41:26.613988 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 29 04:41:26.614218 systemd[1]: Started polkit.service. Oct 29 04:41:26.616876 polkitd[1229]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 29 04:41:26.618778 env[1189]: time="2025-10-29T04:41:26.618740736Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 29 04:41:26.618982 env[1189]: time="2025-10-29T04:41:26.618930970Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 29 04:41:26.619111 env[1189]: time="2025-10-29T04:41:26.619082602Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 29 04:41:26.619411 env[1189]: time="2025-10-29T04:41:26.619374661Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619776 env[1189]: time="2025-10-29T04:41:26.619733018Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619844 env[1189]: time="2025-10-29T04:41:26.619775880Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619844 env[1189]: time="2025-10-29T04:41:26.619800456Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619844 env[1189]: time="2025-10-29T04:41:26.619821864Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619979 env[1189]: time="2025-10-29T04:41:26.619844656Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619979 env[1189]: time="2025-10-29T04:41:26.619868383Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619979 env[1189]: time="2025-10-29T04:41:26.619889915Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.619979 env[1189]: time="2025-10-29T04:41:26.619923250Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 29 04:41:26.620164 env[1189]: time="2025-10-29T04:41:26.620104891Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 29 04:41:26.620345 env[1189]: time="2025-10-29T04:41:26.620278770Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 29 04:41:26.620747 env[1189]: time="2025-10-29T04:41:26.620716159Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 29 04:41:26.620813 env[1189]: time="2025-10-29T04:41:26.620778231Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.620813 env[1189]: time="2025-10-29T04:41:26.620803309Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 29 04:41:26.621056 env[1189]: time="2025-10-29T04:41:26.620926656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621056 env[1189]: time="2025-10-29T04:41:26.620952934Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621056 env[1189]: time="2025-10-29T04:41:26.620979793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621056 env[1189]: time="2025-10-29T04:41:26.621006551Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621056 env[1189]: time="2025-10-29T04:41:26.621030134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621056 env[1189]: time="2025-10-29T04:41:26.621051560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621270 env[1189]: time="2025-10-29T04:41:26.621070913Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621270 env[1189]: time="2025-10-29T04:41:26.621089040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621270 env[1189]: time="2025-10-29T04:41:26.621109902Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 29 04:41:26.621419 env[1189]: time="2025-10-29T04:41:26.621348277Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621419 env[1189]: time="2025-10-29T04:41:26.621374596Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621419 env[1189]: time="2025-10-29T04:41:26.621393937Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.621560 env[1189]: time="2025-10-29T04:41:26.621412876Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 29 04:41:26.621560 env[1189]: time="2025-10-29T04:41:26.621444520Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 29 04:41:26.621560 env[1189]: time="2025-10-29T04:41:26.621462553Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 29 04:41:26.621560 env[1189]: time="2025-10-29T04:41:26.621547492Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 29 04:41:26.621755 env[1189]: time="2025-10-29T04:41:26.621636638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 29 04:41:26.623182 env[1189]: time="2025-10-29T04:41:26.623098842Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 29 04:41:26.627647 env[1189]: time="2025-10-29T04:41:26.623201103Z" level=info msg="Connect containerd service" Oct 29 04:41:26.627647 env[1189]: time="2025-10-29T04:41:26.623275438Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 29 04:41:26.627647 env[1189]: time="2025-10-29T04:41:26.627262517Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 04:41:26.627883 env[1189]: time="2025-10-29T04:41:26.627846657Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 29 04:41:26.627971 env[1189]: time="2025-10-29T04:41:26.627926200Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 29 04:41:26.628140 systemd[1]: Started containerd.service. Oct 29 04:41:26.628359 env[1189]: time="2025-10-29T04:41:26.628133725Z" level=info msg="Start subscribing containerd event" Oct 29 04:41:26.628538 env[1189]: time="2025-10-29T04:41:26.628499344Z" level=info msg="Start recovering state" Oct 29 04:41:26.628776 env[1189]: time="2025-10-29T04:41:26.628748363Z" level=info msg="Start event monitor" Oct 29 04:41:26.629439 env[1189]: time="2025-10-29T04:41:26.629408464Z" level=info msg="Start snapshots syncer" Oct 29 04:41:26.629599 env[1189]: time="2025-10-29T04:41:26.629569534Z" level=info msg="Start cni network conf syncer for default" Oct 29 04:41:26.629738 env[1189]: time="2025-10-29T04:41:26.629710336Z" level=info msg="Start streaming server" Oct 29 04:41:26.641447 env[1189]: time="2025-10-29T04:41:26.641305578Z" level=info msg="containerd successfully booted in 0.191150s" Oct 29 04:41:26.660646 systemd-hostnamed[1205]: Hostname set to (static) Oct 29 04:41:26.670606 systemd-networkd[1020]: eth0: Ignoring DHCPv6 address 2a02:1348:17c:d36b:24:19ff:fef3:4dae/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17c:d36b:24:19ff:fef3:4dae/64 assigned by NDisc. Oct 29 04:41:26.670618 systemd-networkd[1020]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 29 04:41:27.043809 locksmithd[1224]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 29 04:41:28.149334 systemd[1]: Started kubelet.service. Oct 29 04:41:28.859992 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 29 04:41:28.890703 kubelet[1247]: E1029 04:41:28.890635 1247 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:41:28.892830 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:41:28.893077 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:41:28.893595 systemd[1]: kubelet.service: Consumed 1.814s CPU time. Oct 29 04:41:28.899890 systemd[1]: Finished sshd-keygen.service. Oct 29 04:41:28.906250 systemd[1]: Starting issuegen.service... Oct 29 04:41:28.914100 systemd[1]: issuegen.service: Deactivated successfully. Oct 29 04:41:28.914357 systemd[1]: Finished issuegen.service. Oct 29 04:41:28.917401 systemd[1]: Starting systemd-user-sessions.service... Oct 29 04:41:28.927532 systemd[1]: Finished systemd-user-sessions.service. Oct 29 04:41:28.930765 systemd[1]: Started getty@tty1.service. Oct 29 04:41:28.933777 systemd[1]: Started serial-getty@ttyS0.service. Oct 29 04:41:28.934772 systemd[1]: Reached target getty.target. Oct 29 04:41:33.257359 coreos-metadata[1169]: Oct 29 04:41:33.257 WARN failed to locate config-drive, using the metadata service API instead Oct 29 04:41:33.312932 coreos-metadata[1169]: Oct 29 04:41:33.312 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 29 04:41:33.335411 coreos-metadata[1169]: Oct 29 04:41:33.335 INFO Fetch successful Oct 29 04:41:33.335802 coreos-metadata[1169]: Oct 29 04:41:33.335 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 29 04:41:33.363525 coreos-metadata[1169]: Oct 29 04:41:33.363 INFO Fetch successful Oct 29 04:41:33.373110 unknown[1169]: wrote ssh authorized keys file for user: core Oct 29 04:41:33.394008 update-ssh-keys[1269]: Updated "/home/core/.ssh/authorized_keys" Oct 29 04:41:33.395159 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 29 04:41:33.406138 systemd[1]: Reached target multi-user.target. Oct 29 04:41:33.411659 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 29 04:41:33.426973 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 29 04:41:33.427491 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 29 04:41:33.429363 systemd[1]: Startup finished in 1.400s (kernel) + 6.161s (initrd) + 14.658s (userspace) = 22.219s. Oct 29 04:41:35.742799 systemd[1]: Created slice system-sshd.slice. Oct 29 04:41:35.744579 systemd[1]: Started sshd@0-10.243.77.174:22-147.75.109.163:51128.service. Oct 29 04:41:36.661374 sshd[1272]: Accepted publickey for core from 147.75.109.163 port 51128 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:36.665471 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:36.688310 systemd[1]: Created slice user-500.slice. Oct 29 04:41:36.690753 systemd[1]: Starting user-runtime-dir@500.service... Oct 29 04:41:36.698340 systemd-logind[1179]: New session 1 of user core. Oct 29 04:41:36.709594 systemd[1]: Finished user-runtime-dir@500.service. Oct 29 04:41:36.712749 systemd[1]: Starting user@500.service... Oct 29 04:41:36.718635 (systemd)[1275]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:36.829417 systemd[1275]: Queued start job for default target default.target. Oct 29 04:41:36.830535 systemd[1275]: Reached target paths.target. Oct 29 04:41:36.830571 systemd[1275]: Reached target sockets.target. Oct 29 04:41:36.830593 systemd[1275]: Reached target timers.target. Oct 29 04:41:36.830612 systemd[1275]: Reached target basic.target. Oct 29 04:41:36.830713 systemd[1275]: Reached target default.target. Oct 29 04:41:36.830767 systemd[1275]: Startup finished in 101ms. Oct 29 04:41:36.831583 systemd[1]: Started user@500.service. Oct 29 04:41:36.833573 systemd[1]: Started session-1.scope. Oct 29 04:41:37.467208 systemd[1]: Started sshd@1-10.243.77.174:22-147.75.109.163:51130.service. Oct 29 04:41:38.367926 sshd[1284]: Accepted publickey for core from 147.75.109.163 port 51130 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:38.370469 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:38.377805 systemd-logind[1179]: New session 2 of user core. Oct 29 04:41:38.378544 systemd[1]: Started session-2.scope. Oct 29 04:41:38.997043 sshd[1284]: pam_unix(sshd:session): session closed for user core Oct 29 04:41:39.001333 systemd-logind[1179]: Session 2 logged out. Waiting for processes to exit. Oct 29 04:41:39.001793 systemd[1]: sshd@1-10.243.77.174:22-147.75.109.163:51130.service: Deactivated successfully. Oct 29 04:41:39.002996 systemd[1]: session-2.scope: Deactivated successfully. Oct 29 04:41:39.003927 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 29 04:41:39.004288 systemd[1]: Stopped kubelet.service. Oct 29 04:41:39.004342 systemd[1]: kubelet.service: Consumed 1.814s CPU time. Oct 29 04:41:39.006517 systemd[1]: Starting kubelet.service... Oct 29 04:41:39.007668 systemd-logind[1179]: Removed session 2. Oct 29 04:41:39.145918 systemd[1]: Started sshd@2-10.243.77.174:22-147.75.109.163:51138.service. Oct 29 04:41:39.257875 systemd[1]: Started kubelet.service. Oct 29 04:41:39.326874 kubelet[1296]: E1029 04:41:39.326803 1296 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:41:39.331056 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:41:39.331293 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:41:40.039441 sshd[1292]: Accepted publickey for core from 147.75.109.163 port 51138 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:40.042801 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:40.049501 systemd-logind[1179]: New session 3 of user core. Oct 29 04:41:40.050445 systemd[1]: Started session-3.scope. Oct 29 04:41:40.657467 sshd[1292]: pam_unix(sshd:session): session closed for user core Oct 29 04:41:40.661422 systemd[1]: sshd@2-10.243.77.174:22-147.75.109.163:51138.service: Deactivated successfully. Oct 29 04:41:40.662410 systemd[1]: session-3.scope: Deactivated successfully. Oct 29 04:41:40.663165 systemd-logind[1179]: Session 3 logged out. Waiting for processes to exit. Oct 29 04:41:40.664296 systemd-logind[1179]: Removed session 3. Oct 29 04:41:40.820828 systemd[1]: Started sshd@3-10.243.77.174:22-147.75.109.163:43706.service. Oct 29 04:41:41.753257 sshd[1306]: Accepted publickey for core from 147.75.109.163 port 43706 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:41.755412 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:41.763648 systemd[1]: Started session-4.scope. Oct 29 04:41:41.764292 systemd-logind[1179]: New session 4 of user core. Oct 29 04:41:42.393931 sshd[1306]: pam_unix(sshd:session): session closed for user core Oct 29 04:41:42.398079 systemd[1]: sshd@3-10.243.77.174:22-147.75.109.163:43706.service: Deactivated successfully. Oct 29 04:41:42.399055 systemd[1]: session-4.scope: Deactivated successfully. Oct 29 04:41:42.400366 systemd-logind[1179]: Session 4 logged out. Waiting for processes to exit. Oct 29 04:41:42.402049 systemd-logind[1179]: Removed session 4. Oct 29 04:41:42.540002 systemd[1]: Started sshd@4-10.243.77.174:22-147.75.109.163:43718.service. Oct 29 04:41:43.436544 sshd[1312]: Accepted publickey for core from 147.75.109.163 port 43718 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:43.438421 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:43.445923 systemd[1]: Started session-5.scope. Oct 29 04:41:43.446760 systemd-logind[1179]: New session 5 of user core. Oct 29 04:41:43.930229 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 29 04:41:43.930623 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:41:43.940062 dbus-daemon[1170]: \xd0m\u0007U\u001eV: received setenforce notice (enforcing=1211373152) Oct 29 04:41:43.942450 sudo[1315]: pam_unix(sudo:session): session closed for user root Oct 29 04:41:44.088901 sshd[1312]: pam_unix(sshd:session): session closed for user core Oct 29 04:41:44.093343 systemd[1]: sshd@4-10.243.77.174:22-147.75.109.163:43718.service: Deactivated successfully. Oct 29 04:41:44.094406 systemd[1]: session-5.scope: Deactivated successfully. Oct 29 04:41:44.095178 systemd-logind[1179]: Session 5 logged out. Waiting for processes to exit. Oct 29 04:41:44.096344 systemd-logind[1179]: Removed session 5. Oct 29 04:41:44.236826 systemd[1]: Started sshd@5-10.243.77.174:22-147.75.109.163:43730.service. Oct 29 04:41:45.134192 sshd[1319]: Accepted publickey for core from 147.75.109.163 port 43730 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:45.136150 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:45.143153 systemd-logind[1179]: New session 6 of user core. Oct 29 04:41:45.143973 systemd[1]: Started session-6.scope. Oct 29 04:41:45.616554 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 29 04:41:45.617503 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:41:45.622263 sudo[1323]: pam_unix(sudo:session): session closed for user root Oct 29 04:41:45.629870 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 29 04:41:45.630230 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:41:45.645638 systemd[1]: Stopping audit-rules.service... Oct 29 04:41:45.645000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 04:41:45.650011 auditctl[1326]: No rules Oct 29 04:41:45.650554 kernel: kauditd_printk_skb: 205 callbacks suppressed Oct 29 04:41:45.650672 kernel: audit: type=1305 audit(1761712905.645:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 04:41:45.645000 audit[1326]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff5944d620 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:45.652254 systemd[1]: audit-rules.service: Deactivated successfully. Oct 29 04:41:45.652559 systemd[1]: Stopped audit-rules.service. Oct 29 04:41:45.662647 kernel: audit: type=1300 audit(1761712905.645:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff5944d620 a2=420 a3=0 items=0 ppid=1 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:45.662741 kernel: audit: type=1327 audit(1761712905.645:207): proctitle=2F7362696E2F617564697463746C002D44 Oct 29 04:41:45.645000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 29 04:41:45.655637 systemd[1]: Starting audit-rules.service... Oct 29 04:41:45.663861 kernel: audit: type=1131 audit(1761712905.650:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.684557 augenrules[1343]: No rules Oct 29 04:41:45.685959 systemd[1]: Finished audit-rules.service. Oct 29 04:41:45.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.692247 sudo[1322]: pam_unix(sudo:session): session closed for user root Oct 29 04:41:45.692717 kernel: audit: type=1130 audit(1761712905.684:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.690000 audit[1322]: USER_END pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.690000 audit[1322]: CRED_DISP pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.704154 kernel: audit: type=1106 audit(1761712905.690:210): pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.704243 kernel: audit: type=1104 audit(1761712905.690:211): pid=1322 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.845073 sshd[1319]: pam_unix(sshd:session): session closed for user core Oct 29 04:41:45.845000 audit[1319]: USER_END pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:45.849781 systemd[1]: sshd@5-10.243.77.174:22-147.75.109.163:43730.service: Deactivated successfully. Oct 29 04:41:45.850935 systemd[1]: session-6.scope: Deactivated successfully. Oct 29 04:41:45.855733 kernel: audit: type=1106 audit(1761712905.845:212): pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:45.845000 audit[1319]: CRED_DISP pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:45.862055 kernel: audit: type=1104 audit(1761712905.845:213): pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:45.862145 kernel: audit: type=1131 audit(1761712905.846:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.243.77.174:22-147.75.109.163:43730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.243.77.174:22-147.75.109.163:43730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:45.867797 systemd-logind[1179]: Session 6 logged out. Waiting for processes to exit. Oct 29 04:41:45.869904 systemd-logind[1179]: Removed session 6. Oct 29 04:41:46.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.243.77.174:22-147.75.109.163:43734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:46.002670 systemd[1]: Started sshd@6-10.243.77.174:22-147.75.109.163:43734.service. Oct 29 04:41:46.894000 audit[1349]: USER_ACCT pid=1349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:46.897079 sshd[1349]: Accepted publickey for core from 147.75.109.163 port 43734 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:46.896000 audit[1349]: CRED_ACQ pid=1349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:46.896000 audit[1349]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9ceab4d0 a2=3 a3=0 items=0 ppid=1 pid=1349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:46.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:41:46.899412 sshd[1349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:46.907348 systemd[1]: Started session-7.scope. Oct 29 04:41:46.907992 systemd-logind[1179]: New session 7 of user core. Oct 29 04:41:46.913000 audit[1349]: USER_START pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:46.915000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:47.375000 audit[1352]: USER_ACCT pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:47.375000 audit[1352]: CRED_REFR pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:47.377455 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 29 04:41:47.378437 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:41:47.380000 audit[1352]: USER_START pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:47.398200 systemd[1]: Starting coreos-metadata.service... Oct 29 04:41:49.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:49.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:49.582420 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 29 04:41:49.582933 systemd[1]: Stopped kubelet.service. Oct 29 04:41:49.585481 systemd[1]: Starting kubelet.service... Oct 29 04:41:49.846752 systemd[1]: Started kubelet.service. Oct 29 04:41:49.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:49.942399 kubelet[1364]: E1029 04:41:49.942258 1364 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:41:49.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:41:49.944528 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:41:49.944794 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:41:54.453368 coreos-metadata[1356]: Oct 29 04:41:54.453 WARN failed to locate config-drive, using the metadata service API instead Oct 29 04:41:54.517196 coreos-metadata[1356]: Oct 29 04:41:54.516 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 29 04:41:54.519328 coreos-metadata[1356]: Oct 29 04:41:54.519 INFO Fetch successful Oct 29 04:41:54.519604 coreos-metadata[1356]: Oct 29 04:41:54.519 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Oct 29 04:41:54.534666 coreos-metadata[1356]: Oct 29 04:41:54.534 INFO Fetch successful Oct 29 04:41:54.535015 coreos-metadata[1356]: Oct 29 04:41:54.534 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Oct 29 04:41:54.552799 coreos-metadata[1356]: Oct 29 04:41:54.552 INFO Fetch successful Oct 29 04:41:54.553206 coreos-metadata[1356]: Oct 29 04:41:54.553 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Oct 29 04:41:54.568247 coreos-metadata[1356]: Oct 29 04:41:54.567 INFO Fetch successful Oct 29 04:41:54.568606 coreos-metadata[1356]: Oct 29 04:41:54.568 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Oct 29 04:41:54.587457 coreos-metadata[1356]: Oct 29 04:41:54.587 INFO Fetch successful Oct 29 04:41:54.599444 systemd[1]: Finished coreos-metadata.service. Oct 29 04:41:54.604086 kernel: kauditd_printk_skb: 15 callbacks suppressed Oct 29 04:41:54.604199 kernel: audit: type=1130 audit(1761712914.598:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:54.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:55.421924 systemd[1]: Stopped kubelet.service. Oct 29 04:41:55.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:55.435487 kernel: audit: type=1130 audit(1761712915.420:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:55.435620 kernel: audit: type=1131 audit(1761712915.420:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:55.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:55.431296 systemd[1]: Starting kubelet.service... Oct 29 04:41:55.476767 systemd[1]: Reloading. Oct 29 04:41:55.635857 /usr/lib/systemd/system-generators/torcx-generator[1427]: time="2025-10-29T04:41:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 04:41:55.635916 /usr/lib/systemd/system-generators/torcx-generator[1427]: time="2025-10-29T04:41:55Z" level=info msg="torcx already run" Oct 29 04:41:55.741437 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 04:41:55.741513 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 04:41:55.770003 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 04:41:55.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.883918 kernel: audit: type=1400 audit(1761712915.866:231): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.884012 kernel: audit: type=1400 audit(1761712915.866:232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.884057 kernel: audit: type=1400 audit(1761712915.871:233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.884118 kernel: audit: type=1400 audit(1761712915.871:234): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.893658 kernel: audit: type=1400 audit(1761712915.871:235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903711 kernel: audit: type=1400 audit(1761712915.871:236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903803 kernel: audit: type=1400 audit(1761712915.871:237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.887000 audit: BPF prog-id=43 op=LOAD Oct 29 04:41:55.887000 audit: BPF prog-id=34 op=UNLOAD Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit: BPF prog-id=44 op=LOAD Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.897000 audit: BPF prog-id=45 op=LOAD Oct 29 04:41:55.897000 audit: BPF prog-id=24 op=UNLOAD Oct 29 04:41:55.897000 audit: BPF prog-id=25 op=UNLOAD Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.904000 audit: BPF prog-id=46 op=LOAD Oct 29 04:41:55.904000 audit: BPF prog-id=33 op=UNLOAD Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit: BPF prog-id=47 op=LOAD Oct 29 04:41:55.907000 audit: BPF prog-id=35 op=UNLOAD Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit: BPF prog-id=48 op=LOAD Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.907000 audit: BPF prog-id=49 op=LOAD Oct 29 04:41:55.907000 audit: BPF prog-id=36 op=UNLOAD Oct 29 04:41:55.907000 audit: BPF prog-id=37 op=UNLOAD Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit: BPF prog-id=50 op=LOAD Oct 29 04:41:55.908000 audit: BPF prog-id=26 op=UNLOAD Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit: BPF prog-id=51 op=LOAD Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit: BPF prog-id=52 op=LOAD Oct 29 04:41:55.909000 audit: BPF prog-id=27 op=UNLOAD Oct 29 04:41:55.909000 audit: BPF prog-id=28 op=UNLOAD Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.909000 audit: BPF prog-id=53 op=LOAD Oct 29 04:41:55.909000 audit: BPF prog-id=29 op=UNLOAD Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit: BPF prog-id=54 op=LOAD Oct 29 04:41:55.912000 audit: BPF prog-id=30 op=UNLOAD Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit: BPF prog-id=55 op=LOAD Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.912000 audit: BPF prog-id=56 op=LOAD Oct 29 04:41:55.912000 audit: BPF prog-id=31 op=UNLOAD Oct 29 04:41:55.912000 audit: BPF prog-id=32 op=UNLOAD Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.913000 audit: BPF prog-id=57 op=LOAD Oct 29 04:41:55.913000 audit: BPF prog-id=41 op=UNLOAD Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit: BPF prog-id=58 op=LOAD Oct 29 04:41:55.915000 audit: BPF prog-id=38 op=UNLOAD Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit: BPF prog-id=59 op=LOAD Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:55.915000 audit: BPF prog-id=60 op=LOAD Oct 29 04:41:55.915000 audit: BPF prog-id=39 op=UNLOAD Oct 29 04:41:55.915000 audit: BPF prog-id=40 op=UNLOAD Oct 29 04:41:55.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:55.956852 systemd[1]: Stopping kubelet.service... Oct 29 04:41:55.957331 systemd[1]: kubelet.service: Deactivated successfully. Oct 29 04:41:55.957625 systemd[1]: Stopped kubelet.service. Oct 29 04:41:55.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:55.960383 systemd[1]: Starting kubelet.service... Oct 29 04:41:56.104264 systemd[1]: Started kubelet.service. Oct 29 04:41:56.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:56.216406 kubelet[1475]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 04:41:56.217070 kubelet[1475]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 29 04:41:56.217168 kubelet[1475]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 04:41:56.217408 kubelet[1475]: I1029 04:41:56.217361 1475 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 29 04:41:56.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:56.704071 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 29 04:41:56.719000 audit: BPF prog-id=60 op=UNLOAD Oct 29 04:41:56.719000 audit: BPF prog-id=59 op=UNLOAD Oct 29 04:41:56.719000 audit: BPF prog-id=58 op=UNLOAD Oct 29 04:41:56.950773 kubelet[1475]: I1029 04:41:56.950715 1475 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 29 04:41:56.950773 kubelet[1475]: I1029 04:41:56.950755 1475 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 29 04:41:56.951130 kubelet[1475]: I1029 04:41:56.951104 1475 server.go:954] "Client rotation is on, will bootstrap in background" Oct 29 04:41:56.979667 kubelet[1475]: I1029 04:41:56.979523 1475 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 29 04:41:56.995853 kubelet[1475]: E1029 04:41:56.995813 1475 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 29 04:41:56.996107 kubelet[1475]: I1029 04:41:56.996081 1475 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 29 04:41:57.004437 kubelet[1475]: I1029 04:41:57.004411 1475 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 29 04:41:57.006928 kubelet[1475]: I1029 04:41:57.006875 1475 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 29 04:41:57.007324 kubelet[1475]: I1029 04:41:57.007032 1475 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.243.77.174","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 29 04:41:57.007729 kubelet[1475]: I1029 04:41:57.007704 1475 topology_manager.go:138] "Creating topology manager with none policy" Oct 29 04:41:57.007883 kubelet[1475]: I1029 04:41:57.007861 1475 container_manager_linux.go:304] "Creating device plugin manager" Oct 29 04:41:57.008254 kubelet[1475]: I1029 04:41:57.008223 1475 state_mem.go:36] "Initialized new in-memory state store" Oct 29 04:41:57.013943 kubelet[1475]: I1029 04:41:57.013917 1475 kubelet.go:446] "Attempting to sync node with API server" Oct 29 04:41:57.014166 kubelet[1475]: I1029 04:41:57.014130 1475 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 29 04:41:57.014319 kubelet[1475]: I1029 04:41:57.014296 1475 kubelet.go:352] "Adding apiserver pod source" Oct 29 04:41:57.014488 kubelet[1475]: I1029 04:41:57.014465 1475 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 29 04:41:57.019758 kubelet[1475]: E1029 04:41:57.019729 1475 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:41:57.020025 kubelet[1475]: E1029 04:41:57.019998 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:41:57.026866 kubelet[1475]: I1029 04:41:57.026833 1475 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 29 04:41:57.027631 kubelet[1475]: I1029 04:41:57.027571 1475 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 29 04:41:57.028404 kubelet[1475]: W1029 04:41:57.028366 1475 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 29 04:41:57.030885 kubelet[1475]: I1029 04:41:57.030838 1475 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 29 04:41:57.030987 kubelet[1475]: I1029 04:41:57.030908 1475 server.go:1287] "Started kubelet" Oct 29 04:41:57.031246 kubelet[1475]: I1029 04:41:57.031166 1475 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 29 04:41:57.033135 kubelet[1475]: I1029 04:41:57.033110 1475 server.go:479] "Adding debug handlers to kubelet server" Oct 29 04:41:57.035844 kubelet[1475]: I1029 04:41:57.035725 1475 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 29 04:41:57.036337 kubelet[1475]: I1029 04:41:57.036301 1475 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 29 04:41:57.039000 audit[1475]: AVC avc: denied { mac_admin } for pid=1475 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:57.039000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:41:57.039000 audit[1475]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ac9320 a1=c0009a58a8 a2=c000ac92f0 a3=25 items=0 ppid=1 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.039000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:41:57.041721 kubelet[1475]: I1029 04:41:57.041657 1475 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 29 04:41:57.041000 audit[1475]: AVC avc: denied { mac_admin } for pid=1475 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:57.041000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:41:57.041000 audit[1475]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a8efe0 a1=c0009a58c0 a2=c000ac93b0 a3=25 items=0 ppid=1 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.041000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:41:57.043662 kubelet[1475]: I1029 04:41:57.043606 1475 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 29 04:41:57.043974 kubelet[1475]: I1029 04:41:57.043949 1475 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 29 04:41:57.051912 kubelet[1475]: W1029 04:41:57.051869 1475 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.243.77.174" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 29 04:41:57.052059 kubelet[1475]: E1029 04:41:57.051969 1475 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.243.77.174\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Oct 29 04:41:57.058769 kubelet[1475]: I1029 04:41:57.057007 1475 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 29 04:41:57.058769 kubelet[1475]: E1029 04:41:57.052105 1475 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.243.77.174.1872dc9067d79f3f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.243.77.174,UID:10.243.77.174,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.243.77.174,},FirstTimestamp:2025-10-29 04:41:57.030870847 +0000 UTC m=+0.919353512,LastTimestamp:2025-10-29 04:41:57.030870847 +0000 UTC m=+0.919353512,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.243.77.174,}" Oct 29 04:41:57.064868 kubelet[1475]: I1029 04:41:57.064826 1475 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 29 04:41:57.065405 kubelet[1475]: E1029 04:41:57.065372 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.066201 kubelet[1475]: I1029 04:41:57.066177 1475 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 29 04:41:57.066441 kubelet[1475]: I1029 04:41:57.066407 1475 reconciler.go:26] "Reconciler: start to sync state" Oct 29 04:41:57.067798 kubelet[1475]: W1029 04:41:57.067760 1475 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 29 04:41:57.067964 kubelet[1475]: E1029 04:41:57.067928 1475 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Oct 29 04:41:57.069532 kubelet[1475]: E1029 04:41:57.069498 1475 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.243.77.174\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 29 04:41:57.072962 kubelet[1475]: I1029 04:41:57.072935 1475 factory.go:221] Registration of the systemd container factory successfully Oct 29 04:41:57.073279 kubelet[1475]: I1029 04:41:57.073200 1475 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 29 04:41:57.074988 kubelet[1475]: W1029 04:41:57.074961 1475 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 29 04:41:57.075168 kubelet[1475]: E1029 04:41:57.075117 1475 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Oct 29 04:41:57.077528 kubelet[1475]: E1029 04:41:57.077501 1475 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 29 04:41:57.078114 kubelet[1475]: I1029 04:41:57.078088 1475 factory.go:221] Registration of the containerd container factory successfully Oct 29 04:41:57.126000 audit[1490]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.126000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1b66bf20 a2=0 a3=7ffd1b66bf0c items=0 ppid=1475 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 04:41:57.140079 kubelet[1475]: E1029 04:41:57.138881 1475 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.243.77.174.1872dc906a9ef3be default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.243.77.174,UID:10.243.77.174,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.243.77.174,},FirstTimestamp:2025-10-29 04:41:57.077488574 +0000 UTC m=+0.965971238,LastTimestamp:2025-10-29 04:41:57.077488574 +0000 UTC m=+0.965971238,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.243.77.174,}" Oct 29 04:41:57.144623 kubelet[1475]: I1029 04:41:57.144597 1475 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 29 04:41:57.144814 kubelet[1475]: I1029 04:41:57.144790 1475 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 29 04:41:57.144984 kubelet[1475]: I1029 04:41:57.144962 1475 state_mem.go:36] "Initialized new in-memory state store" Oct 29 04:41:57.147372 kubelet[1475]: I1029 04:41:57.147349 1475 policy_none.go:49] "None policy: Start" Oct 29 04:41:57.145000 audit[1498]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.145000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff3e332da0 a2=0 a3=7fff3e332d8c items=0 ppid=1475 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 04:41:57.148226 kubelet[1475]: I1029 04:41:57.148195 1475 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 29 04:41:57.148400 kubelet[1475]: I1029 04:41:57.148369 1475 state_mem.go:35] "Initializing new in-memory state store" Oct 29 04:41:57.152087 kubelet[1475]: E1029 04:41:57.151862 1475 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.243.77.174.1872dc906e78a3e4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.243.77.174,UID:10.243.77.174,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.243.77.174 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.243.77.174,},FirstTimestamp:2025-10-29 04:41:57.142086628 +0000 UTC m=+1.030569287,LastTimestamp:2025-10-29 04:41:57.142086628 +0000 UTC m=+1.030569287,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.243.77.174,}" Oct 29 04:41:57.160637 systemd[1]: Created slice kubepods.slice. Oct 29 04:41:57.166197 kubelet[1475]: E1029 04:41:57.166132 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.170913 systemd[1]: Created slice kubepods-burstable.slice. Oct 29 04:41:57.176558 systemd[1]: Created slice kubepods-besteffort.slice. Oct 29 04:41:57.184382 kubelet[1475]: I1029 04:41:57.184348 1475 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 29 04:41:57.182000 audit[1475]: AVC avc: denied { mac_admin } for pid=1475 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:57.182000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:41:57.182000 audit[1475]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d6d2f0 a1=c000e0ac30 a2=c000d6d2c0 a3=25 items=0 ppid=1 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:41:57.185385 kubelet[1475]: I1029 04:41:57.185354 1475 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 29 04:41:57.185738 kubelet[1475]: I1029 04:41:57.185714 1475 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 29 04:41:57.185912 kubelet[1475]: I1029 04:41:57.185856 1475 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 29 04:41:57.188820 kubelet[1475]: I1029 04:41:57.188677 1475 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 29 04:41:57.192635 kubelet[1475]: E1029 04:41:57.192564 1475 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 29 04:41:57.192796 kubelet[1475]: E1029 04:41:57.192731 1475 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.243.77.174\" not found" Oct 29 04:41:57.157000 audit[1500]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.157000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3640eda0 a2=0 a3=7ffe3640ed8c items=0 ppid=1475 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:41:57.202000 audit[1505]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1505 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.202000 audit[1505]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb617d760 a2=0 a3=7ffdb617d74c items=0 ppid=1475 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:41:57.260000 audit[1510]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1510 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.260000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd78086990 a2=0 a3=7ffd7808697c items=0 ppid=1475 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 29 04:41:57.265105 kubelet[1475]: I1029 04:41:57.264543 1475 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 29 04:41:57.265000 audit[1511]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1511 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:41:57.265000 audit[1511]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeef2fbea0 a2=0 a3=7ffeef2fbe8c items=0 ppid=1475 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 04:41:57.267849 kubelet[1475]: I1029 04:41:57.267817 1475 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 29 04:41:57.267941 kubelet[1475]: I1029 04:41:57.267880 1475 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 29 04:41:57.267941 kubelet[1475]: I1029 04:41:57.267919 1475 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 29 04:41:57.267941 kubelet[1475]: I1029 04:41:57.267940 1475 kubelet.go:2382] "Starting kubelet main sync loop" Oct 29 04:41:57.268171 kubelet[1475]: E1029 04:41:57.268139 1475 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 29 04:41:57.266000 audit[1512]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1512 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.266000 audit[1512]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc01f48780 a2=0 a3=7ffc01f4876c items=0 ppid=1475 pid=1512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 04:41:57.269000 audit[1513]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1513 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:41:57.269000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd011fc9c0 a2=0 a3=7ffd011fc9ac items=0 ppid=1475 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 04:41:57.270000 audit[1514]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.270000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff84d3e7d0 a2=0 a3=7fff84d3e7bc items=0 ppid=1475 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 04:41:57.271000 audit[1515]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1515 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:41:57.271000 audit[1515]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd4df06bd0 a2=0 a3=7ffd4df06bbc items=0 ppid=1475 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 04:41:57.272000 audit[1516]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:41:57.272000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda9114240 a2=0 a3=7ffda911422c items=0 ppid=1475 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 04:41:57.274000 audit[1517]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1517 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:41:57.274000 audit[1517]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc984f3d0 a2=0 a3=7fffc984f3bc items=0 ppid=1475 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:57.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 04:41:57.280092 kubelet[1475]: E1029 04:41:57.280050 1475 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.243.77.174\" not found" node="10.243.77.174" Oct 29 04:41:57.287306 kubelet[1475]: I1029 04:41:57.287281 1475 kubelet_node_status.go:75] "Attempting to register node" node="10.243.77.174" Oct 29 04:41:57.298573 kubelet[1475]: I1029 04:41:57.298518 1475 kubelet_node_status.go:78] "Successfully registered node" node="10.243.77.174" Oct 29 04:41:57.298573 kubelet[1475]: E1029 04:41:57.298565 1475 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.243.77.174\": node \"10.243.77.174\" not found" Oct 29 04:41:57.320681 kubelet[1475]: E1029 04:41:57.320621 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.421209 kubelet[1475]: E1029 04:41:57.421128 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.522525 kubelet[1475]: E1029 04:41:57.522377 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.624512 kubelet[1475]: E1029 04:41:57.624392 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.677498 sudo[1352]: pam_unix(sudo:session): session closed for user root Oct 29 04:41:57.675000 audit[1352]: USER_END pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:57.676000 audit[1352]: CRED_DISP pid=1352 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:41:57.725298 kubelet[1475]: E1029 04:41:57.725188 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.823953 sshd[1349]: pam_unix(sshd:session): session closed for user core Oct 29 04:41:57.825630 kubelet[1475]: E1029 04:41:57.825584 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.825000 audit[1349]: USER_END pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:57.825000 audit[1349]: CRED_DISP pid=1349 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:57.829292 systemd[1]: sshd@6-10.243.77.174:22-147.75.109.163:43734.service: Deactivated successfully. Oct 29 04:41:57.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.243.77.174:22-147.75.109.163:43734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:57.830907 systemd[1]: session-7.scope: Deactivated successfully. Oct 29 04:41:57.831829 systemd-logind[1179]: Session 7 logged out. Waiting for processes to exit. Oct 29 04:41:57.833832 systemd-logind[1179]: Removed session 7. Oct 29 04:41:57.926727 kubelet[1475]: E1029 04:41:57.926642 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:57.953916 kubelet[1475]: I1029 04:41:57.953876 1475 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 29 04:41:57.954382 kubelet[1475]: W1029 04:41:57.954352 1475 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Oct 29 04:41:58.020952 kubelet[1475]: E1029 04:41:58.020846 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:41:58.027342 kubelet[1475]: E1029 04:41:58.027212 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:58.127813 kubelet[1475]: E1029 04:41:58.127607 1475 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.243.77.174\" not found" Oct 29 04:41:58.229865 kubelet[1475]: I1029 04:41:58.229823 1475 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 29 04:41:58.230978 env[1189]: time="2025-10-29T04:41:58.230629069Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 29 04:41:58.231588 kubelet[1475]: I1029 04:41:58.231078 1475 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 29 04:41:59.021600 kubelet[1475]: E1029 04:41:59.021539 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:41:59.022298 kubelet[1475]: I1029 04:41:59.022270 1475 apiserver.go:52] "Watching apiserver" Oct 29 04:41:59.042244 kubelet[1475]: E1029 04:41:59.042103 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:41:59.049122 systemd[1]: Created slice kubepods-besteffort-pod4a74204e_e6d1_4b99_bbf6_72a9a1f6b491.slice. Oct 29 04:41:59.062571 systemd[1]: Created slice kubepods-besteffort-pod3161194f_4a23_4eea_b6a6_df08ce4d9883.slice. Oct 29 04:41:59.068563 kubelet[1475]: I1029 04:41:59.068527 1475 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 29 04:41:59.078251 kubelet[1475]: I1029 04:41:59.078209 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-cni-net-dir\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.078532 kubelet[1475]: I1029 04:41:59.078500 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-lib-modules\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.078762 kubelet[1475]: I1029 04:41:59.078705 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-node-certs\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.078919 kubelet[1475]: I1029 04:41:59.078890 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-var-run-calico\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.079059 kubelet[1475]: I1029 04:41:59.079031 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c039d16b-2bfe-46ec-aef3-ee4416970de2-kubelet-dir\") pod \"csi-node-driver-55g6q\" (UID: \"c039d16b-2bfe-46ec-aef3-ee4416970de2\") " pod="calico-system/csi-node-driver-55g6q" Oct 29 04:41:59.079232 kubelet[1475]: I1029 04:41:59.079204 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c039d16b-2bfe-46ec-aef3-ee4416970de2-registration-dir\") pod \"csi-node-driver-55g6q\" (UID: \"c039d16b-2bfe-46ec-aef3-ee4416970de2\") " pod="calico-system/csi-node-driver-55g6q" Oct 29 04:41:59.079459 kubelet[1475]: I1029 04:41:59.079412 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/3161194f-4a23-4eea-b6a6-df08ce4d9883-kube-proxy\") pod \"kube-proxy-fzxpc\" (UID: \"3161194f-4a23-4eea-b6a6-df08ce4d9883\") " pod="kube-system/kube-proxy-fzxpc" Oct 29 04:41:59.079667 kubelet[1475]: I1029 04:41:59.079621 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3161194f-4a23-4eea-b6a6-df08ce4d9883-xtables-lock\") pod \"kube-proxy-fzxpc\" (UID: \"3161194f-4a23-4eea-b6a6-df08ce4d9883\") " pod="kube-system/kube-proxy-fzxpc" Oct 29 04:41:59.079940 kubelet[1475]: I1029 04:41:59.079912 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-flexvol-driver-host\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.080121 kubelet[1475]: I1029 04:41:59.080095 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c039d16b-2bfe-46ec-aef3-ee4416970de2-socket-dir\") pod \"csi-node-driver-55g6q\" (UID: \"c039d16b-2bfe-46ec-aef3-ee4416970de2\") " pod="calico-system/csi-node-driver-55g6q" Oct 29 04:41:59.080345 kubelet[1475]: I1029 04:41:59.080319 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xqg8n\" (UniqueName: \"kubernetes.io/projected/3161194f-4a23-4eea-b6a6-df08ce4d9883-kube-api-access-xqg8n\") pod \"kube-proxy-fzxpc\" (UID: \"3161194f-4a23-4eea-b6a6-df08ce4d9883\") " pod="kube-system/kube-proxy-fzxpc" Oct 29 04:41:59.080548 kubelet[1475]: I1029 04:41:59.080522 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-cni-bin-dir\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.080762 kubelet[1475]: I1029 04:41:59.080726 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-policysync\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.080934 kubelet[1475]: I1029 04:41:59.080908 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2pwf6\" (UniqueName: \"kubernetes.io/projected/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-kube-api-access-2pwf6\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.081139 kubelet[1475]: I1029 04:41:59.081112 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c039d16b-2bfe-46ec-aef3-ee4416970de2-varrun\") pod \"csi-node-driver-55g6q\" (UID: \"c039d16b-2bfe-46ec-aef3-ee4416970de2\") " pod="calico-system/csi-node-driver-55g6q" Oct 29 04:41:59.081358 kubelet[1475]: I1029 04:41:59.081332 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3161194f-4a23-4eea-b6a6-df08ce4d9883-lib-modules\") pod \"kube-proxy-fzxpc\" (UID: \"3161194f-4a23-4eea-b6a6-df08ce4d9883\") " pod="kube-system/kube-proxy-fzxpc" Oct 29 04:41:59.081549 kubelet[1475]: I1029 04:41:59.081522 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-cni-log-dir\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.081778 kubelet[1475]: I1029 04:41:59.081730 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-tigera-ca-bundle\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.081981 kubelet[1475]: I1029 04:41:59.081956 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-var-lib-calico\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.082177 kubelet[1475]: I1029 04:41:59.082152 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4a74204e-e6d1-4b99-bbf6-72a9a1f6b491-xtables-lock\") pod \"calico-node-mxt9n\" (UID: \"4a74204e-e6d1-4b99-bbf6-72a9a1f6b491\") " pod="calico-system/calico-node-mxt9n" Oct 29 04:41:59.082402 kubelet[1475]: I1029 04:41:59.082356 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65fdj\" (UniqueName: \"kubernetes.io/projected/c039d16b-2bfe-46ec-aef3-ee4416970de2-kube-api-access-65fdj\") pod \"csi-node-driver-55g6q\" (UID: \"c039d16b-2bfe-46ec-aef3-ee4416970de2\") " pod="calico-system/csi-node-driver-55g6q" Oct 29 04:41:59.186457 kubelet[1475]: E1029 04:41:59.186417 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.186820 kubelet[1475]: W1029 04:41:59.186725 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.187126 kubelet[1475]: E1029 04:41:59.187088 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.187448 kubelet[1475]: E1029 04:41:59.187422 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.187448 kubelet[1475]: W1029 04:41:59.187445 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.187630 kubelet[1475]: E1029 04:41:59.187471 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.187811 kubelet[1475]: E1029 04:41:59.187789 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.187811 kubelet[1475]: W1029 04:41:59.187808 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.187922 kubelet[1475]: E1029 04:41:59.187831 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.188157 kubelet[1475]: E1029 04:41:59.188102 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.188157 kubelet[1475]: W1029 04:41:59.188145 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.188357 kubelet[1475]: E1029 04:41:59.188320 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.188489 kubelet[1475]: E1029 04:41:59.188397 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.188661 kubelet[1475]: W1029 04:41:59.188635 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.188884 kubelet[1475]: E1029 04:41:59.188848 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.189274 kubelet[1475]: E1029 04:41:59.189252 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.189382 kubelet[1475]: W1029 04:41:59.189358 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.189527 kubelet[1475]: E1029 04:41:59.189501 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.189982 kubelet[1475]: E1029 04:41:59.189939 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.190099 kubelet[1475]: W1029 04:41:59.190073 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.190249 kubelet[1475]: E1029 04:41:59.190215 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.190576 kubelet[1475]: E1029 04:41:59.190554 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.190722 kubelet[1475]: W1029 04:41:59.190674 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.190917 kubelet[1475]: E1029 04:41:59.190882 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.191344 kubelet[1475]: E1029 04:41:59.191305 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.191501 kubelet[1475]: W1029 04:41:59.191471 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.192046 kubelet[1475]: E1029 04:41:59.191806 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.192411 kubelet[1475]: E1029 04:41:59.192389 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.192553 kubelet[1475]: W1029 04:41:59.192528 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.192779 kubelet[1475]: E1029 04:41:59.192750 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.193136 kubelet[1475]: E1029 04:41:59.193115 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.193271 kubelet[1475]: W1029 04:41:59.193246 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.193406 kubelet[1475]: E1029 04:41:59.193378 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.193762 kubelet[1475]: E1029 04:41:59.193729 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.193878 kubelet[1475]: W1029 04:41:59.193853 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.194038 kubelet[1475]: E1029 04:41:59.194010 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.194505 kubelet[1475]: E1029 04:41:59.194483 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.194618 kubelet[1475]: W1029 04:41:59.194595 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.194864 kubelet[1475]: E1029 04:41:59.194832 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.195234 kubelet[1475]: E1029 04:41:59.195211 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.195341 kubelet[1475]: W1029 04:41:59.195317 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.195530 kubelet[1475]: E1029 04:41:59.195498 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.196321 kubelet[1475]: E1029 04:41:59.196299 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.196434 kubelet[1475]: W1029 04:41:59.196410 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.196601 kubelet[1475]: E1029 04:41:59.196567 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.196962 kubelet[1475]: E1029 04:41:59.196941 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.197111 kubelet[1475]: W1029 04:41:59.197086 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.197271 kubelet[1475]: E1029 04:41:59.197243 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.197606 kubelet[1475]: E1029 04:41:59.197585 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.197775 kubelet[1475]: W1029 04:41:59.197738 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.197924 kubelet[1475]: E1029 04:41:59.197897 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.198246 kubelet[1475]: E1029 04:41:59.198225 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.198380 kubelet[1475]: W1029 04:41:59.198355 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.198570 kubelet[1475]: E1029 04:41:59.198532 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.198935 kubelet[1475]: E1029 04:41:59.198914 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.199053 kubelet[1475]: W1029 04:41:59.199028 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.199224 kubelet[1475]: E1029 04:41:59.199194 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.199578 kubelet[1475]: E1029 04:41:59.199556 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.199697 kubelet[1475]: W1029 04:41:59.199662 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.199855 kubelet[1475]: E1029 04:41:59.199801 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.200161 kubelet[1475]: E1029 04:41:59.200134 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.200161 kubelet[1475]: W1029 04:41:59.200156 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.200317 kubelet[1475]: E1029 04:41:59.200249 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.200521 kubelet[1475]: E1029 04:41:59.200500 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.200593 kubelet[1475]: W1029 04:41:59.200521 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.200668 kubelet[1475]: E1029 04:41:59.200630 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.200844 kubelet[1475]: E1029 04:41:59.200824 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.200911 kubelet[1475]: W1029 04:41:59.200844 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.200981 kubelet[1475]: E1029 04:41:59.200953 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.201145 kubelet[1475]: E1029 04:41:59.201126 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.201202 kubelet[1475]: W1029 04:41:59.201146 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.201276 kubelet[1475]: E1029 04:41:59.201255 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.201439 kubelet[1475]: E1029 04:41:59.201421 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.201505 kubelet[1475]: W1029 04:41:59.201440 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.201851 kubelet[1475]: E1029 04:41:59.201646 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.202627 kubelet[1475]: I1029 04:41:59.202582 1475 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 29 04:41:59.202892 kubelet[1475]: E1029 04:41:59.202866 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.202892 kubelet[1475]: W1029 04:41:59.202887 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.203223 kubelet[1475]: E1029 04:41:59.203196 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.203223 kubelet[1475]: W1029 04:41:59.203216 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.203493 kubelet[1475]: E1029 04:41:59.203469 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.203493 kubelet[1475]: W1029 04:41:59.203489 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.203792 kubelet[1475]: E1029 04:41:59.203767 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.203792 kubelet[1475]: W1029 04:41:59.203789 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.204092 kubelet[1475]: E1029 04:41:59.204068 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.204092 kubelet[1475]: W1029 04:41:59.204087 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.204376 kubelet[1475]: E1029 04:41:59.204351 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.204450 kubelet[1475]: W1029 04:41:59.204377 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.204647 kubelet[1475]: E1029 04:41:59.204623 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.204647 kubelet[1475]: W1029 04:41:59.204642 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.204811 kubelet[1475]: E1029 04:41:59.204658 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.213365 kubelet[1475]: E1029 04:41:59.213331 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.218850 kubelet[1475]: E1029 04:41:59.218825 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.219002 kubelet[1475]: W1029 04:41:59.218975 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.219117 kubelet[1475]: E1029 04:41:59.219092 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.219255 kubelet[1475]: E1029 04:41:59.219229 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.219468 kubelet[1475]: E1029 04:41:59.219363 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.219468 kubelet[1475]: E1029 04:41:59.219374 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.219750 kubelet[1475]: E1029 04:41:59.219381 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.219812 kubelet[1475]: E1029 04:41:59.219387 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.220402 kubelet[1475]: E1029 04:41:59.220362 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.220402 kubelet[1475]: W1029 04:41:59.220394 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.220537 kubelet[1475]: E1029 04:41:59.220420 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.221977 kubelet[1475]: E1029 04:41:59.221946 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.222047 kubelet[1475]: W1029 04:41:59.222002 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.222047 kubelet[1475]: E1029 04:41:59.222028 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.223924 kubelet[1475]: E1029 04:41:59.223893 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.223924 kubelet[1475]: W1029 04:41:59.223916 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.224057 kubelet[1475]: E1029 04:41:59.223934 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.230572 kubelet[1475]: E1029 04:41:59.230547 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.230857 kubelet[1475]: W1029 04:41:59.230831 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.230975 kubelet[1475]: E1029 04:41:59.230950 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.244295 kubelet[1475]: E1029 04:41:59.244230 1475 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:41:59.244295 kubelet[1475]: W1029 04:41:59.244255 1475 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:41:59.244295 kubelet[1475]: E1029 04:41:59.244276 1475 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:59.361249 env[1189]: time="2025-10-29T04:41:59.361091382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mxt9n,Uid:4a74204e-e6d1-4b99-bbf6-72a9a1f6b491,Namespace:calico-system,Attempt:0,}" Oct 29 04:41:59.376207 env[1189]: time="2025-10-29T04:41:59.375837946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fzxpc,Uid:3161194f-4a23-4eea-b6a6-df08ce4d9883,Namespace:kube-system,Attempt:0,}" Oct 29 04:42:00.022667 kubelet[1475]: E1029 04:42:00.022588 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:00.285562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount704269797.mount: Deactivated successfully. Oct 29 04:42:00.296563 env[1189]: time="2025-10-29T04:42:00.296509943Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.298906 env[1189]: time="2025-10-29T04:42:00.298850440Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.301849 env[1189]: time="2025-10-29T04:42:00.301815025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.304203 env[1189]: time="2025-10-29T04:42:00.304165851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.306235 env[1189]: time="2025-10-29T04:42:00.306198828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.310482 env[1189]: time="2025-10-29T04:42:00.309623953Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.312606 env[1189]: time="2025-10-29T04:42:00.312538179Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.318407 env[1189]: time="2025-10-29T04:42:00.318371552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:00.352416 env[1189]: time="2025-10-29T04:42:00.352293146Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:42:00.352587 env[1189]: time="2025-10-29T04:42:00.352443221Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:42:00.352587 env[1189]: time="2025-10-29T04:42:00.352520466Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:42:00.353151 env[1189]: time="2025-10-29T04:42:00.353077746Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:42:00.353287 env[1189]: time="2025-10-29T04:42:00.353240833Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:42:00.353382 env[1189]: time="2025-10-29T04:42:00.353300318Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:42:00.353621 env[1189]: time="2025-10-29T04:42:00.353555545Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc480abc3996b81d97583138f971d6f6a3fff82796a72ccb6427a2f0d5e18f02 pid=1580 runtime=io.containerd.runc.v2 Oct 29 04:42:00.354177 env[1189]: time="2025-10-29T04:42:00.354029247Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb pid=1579 runtime=io.containerd.runc.v2 Oct 29 04:42:00.387216 systemd[1]: Started cri-containerd-fc480abc3996b81d97583138f971d6f6a3fff82796a72ccb6427a2f0d5e18f02.scope. Oct 29 04:42:00.409072 systemd[1]: Started cri-containerd-df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb.scope. Oct 29 04:42:00.452299 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 29 04:42:00.452615 kernel: audit: type=1400 audit(1761712920.437:464): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463281 kernel: audit: type=1400 audit(1761712920.437:465): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463378 kernel: audit: type=1400 audit(1761712920.437:466): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.477537 kernel: audit: type=1400 audit(1761712920.437:467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.477627 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 29 04:42:00.477709 kernel: audit: type=1400 audit(1761712920.437:468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.477771 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 29 04:42:00.477816 kernel: audit: type=1400 audit(1761712920.437:469): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.477912 kernel: audit: backlog limit exceeded Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.484905 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.438000 audit: BPF prog-id=61 op=LOAD Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1580 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343830616263333939366238316439373538333133386639373164 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1580 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343830616263333939366238316439373538333133386639373164 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.451000 audit: BPF prog-id=62 op=LOAD Oct 29 04:42:00.451000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ce260 items=0 ppid=1580 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343830616263333939366238316439373538333133386639373164 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.456000 audit: BPF prog-id=63 op=LOAD Oct 29 04:42:00.456000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ce2a8 items=0 ppid=1580 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343830616263333939366238316439373538333133386639373164 Oct 29 04:42:00.456000 audit: BPF prog-id=63 op=UNLOAD Oct 29 04:42:00.457000 audit: BPF prog-id=62 op=UNLOAD Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.457000 audit: BPF prog-id=64 op=LOAD Oct 29 04:42:00.457000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ce6b8 items=0 ppid=1580 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343830616263333939366238316439373538333133386639373164 Oct 29 04:42:00.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1579 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396636333439353866313633663230666531356532313837666231 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1579 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396636333439353866313633663230666531356532313837666231 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit: BPF prog-id=66 op=LOAD Oct 29 04:42:00.488000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015ff10 items=0 ppid=1579 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396636333439353866313633663230666531356532313837666231 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.488000 audit: BPF prog-id=67 op=LOAD Oct 29 04:42:00.488000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015ff58 items=0 ppid=1579 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396636333439353866313633663230666531356532313837666231 Oct 29 04:42:00.489000 audit: BPF prog-id=67 op=UNLOAD Oct 29 04:42:00.489000 audit: BPF prog-id=66 op=UNLOAD Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { perfmon } for pid=1599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit[1599]: AVC avc: denied { bpf } for pid=1599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:00.489000 audit: BPF prog-id=68 op=LOAD Oct 29 04:42:00.489000 audit[1599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000220368 items=0 ppid=1579 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:00.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396636333439353866313633663230666531356532313837666231 Oct 29 04:42:00.571466 env[1189]: time="2025-10-29T04:42:00.571029869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mxt9n,Uid:4a74204e-e6d1-4b99-bbf6-72a9a1f6b491,Namespace:calico-system,Attempt:0,} returns sandbox id \"df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb\"" Oct 29 04:42:00.573902 env[1189]: time="2025-10-29T04:42:00.573861918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fzxpc,Uid:3161194f-4a23-4eea-b6a6-df08ce4d9883,Namespace:kube-system,Attempt:0,} returns sandbox id \"fc480abc3996b81d97583138f971d6f6a3fff82796a72ccb6427a2f0d5e18f02\"" Oct 29 04:42:00.576798 env[1189]: time="2025-10-29T04:42:00.576765952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 29 04:42:01.023782 kubelet[1475]: E1029 04:42:01.023340 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:01.272932 kubelet[1475]: E1029 04:42:01.272235 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:01.928041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1615507568.mount: Deactivated successfully. Oct 29 04:42:02.024309 kubelet[1475]: E1029 04:42:02.024207 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:02.120493 env[1189]: time="2025-10-29T04:42:02.120430115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:02.122294 env[1189]: time="2025-10-29T04:42:02.122259569Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:02.124274 env[1189]: time="2025-10-29T04:42:02.124224265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:02.126123 env[1189]: time="2025-10-29T04:42:02.126088468Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:02.126984 env[1189]: time="2025-10-29T04:42:02.126935856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 29 04:42:02.129568 env[1189]: time="2025-10-29T04:42:02.129533799Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Oct 29 04:42:02.131652 env[1189]: time="2025-10-29T04:42:02.131603692Z" level=info msg="CreateContainer within sandbox \"df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 29 04:42:02.147569 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount648259568.mount: Deactivated successfully. Oct 29 04:42:02.157992 env[1189]: time="2025-10-29T04:42:02.157894319Z" level=info msg="CreateContainer within sandbox \"df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845\"" Oct 29 04:42:02.159924 env[1189]: time="2025-10-29T04:42:02.159735292Z" level=info msg="StartContainer for \"7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845\"" Oct 29 04:42:02.190447 systemd[1]: Started cri-containerd-7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845.scope. Oct 29 04:42:02.248000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.248000 audit[1656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb293ec02f8 items=0 ppid=1579 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:02.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763313563643030396661303161303336343333373532366334333434 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.249000 audit: BPF prog-id=69 op=LOAD Oct 29 04:42:02.249000 audit[1656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024728 items=0 ppid=1579 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:02.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763313563643030396661303161303336343333373532366334333434 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.250000 audit: BPF prog-id=70 op=LOAD Oct 29 04:42:02.250000 audit[1656]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024778 items=0 ppid=1579 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:02.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763313563643030396661303161303336343333373532366334333434 Oct 29 04:42:02.251000 audit: BPF prog-id=70 op=UNLOAD Oct 29 04:42:02.251000 audit: BPF prog-id=69 op=UNLOAD Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { perfmon } for pid=1656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit[1656]: AVC avc: denied { bpf } for pid=1656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:02.251000 audit: BPF prog-id=71 op=LOAD Oct 29 04:42:02.251000 audit[1656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024808 items=0 ppid=1579 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:02.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763313563643030396661303161303336343333373532366334333434 Oct 29 04:42:02.286910 env[1189]: time="2025-10-29T04:42:02.286847166Z" level=info msg="StartContainer for \"7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845\" returns successfully" Oct 29 04:42:02.300176 systemd[1]: cri-containerd-7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845.scope: Deactivated successfully. Oct 29 04:42:02.303000 audit: BPF prog-id=71 op=UNLOAD Oct 29 04:42:02.335150 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845-rootfs.mount: Deactivated successfully. Oct 29 04:42:02.378828 env[1189]: time="2025-10-29T04:42:02.378743215Z" level=info msg="shim disconnected" id=7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845 Oct 29 04:42:02.378828 env[1189]: time="2025-10-29T04:42:02.378824310Z" level=warning msg="cleaning up after shim disconnected" id=7c15cd009fa01a0364337526c4344478a8da5fb994ea25fa2b4c319a8a21c845 namespace=k8s.io Oct 29 04:42:02.379262 env[1189]: time="2025-10-29T04:42:02.378843948Z" level=info msg="cleaning up dead shim" Oct 29 04:42:02.391893 env[1189]: time="2025-10-29T04:42:02.391825431Z" level=warning msg="cleanup warnings time=\"2025-10-29T04:42:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1700 runtime=io.containerd.runc.v2\n" Oct 29 04:42:03.025270 kubelet[1475]: E1029 04:42:03.025156 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:03.269555 kubelet[1475]: E1029 04:42:03.268937 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:03.916789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount874688010.mount: Deactivated successfully. Oct 29 04:42:04.026374 kubelet[1475]: E1029 04:42:04.026287 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:05.026826 kubelet[1475]: E1029 04:42:05.026710 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:05.271608 kubelet[1475]: E1029 04:42:05.271513 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:05.310841 env[1189]: time="2025-10-29T04:42:05.310495697Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:05.313820 env[1189]: time="2025-10-29T04:42:05.313755149Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:05.315563 env[1189]: time="2025-10-29T04:42:05.315526646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:05.317205 env[1189]: time="2025-10-29T04:42:05.317162048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:05.318016 env[1189]: time="2025-10-29T04:42:05.317964433Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Oct 29 04:42:05.320452 env[1189]: time="2025-10-29T04:42:05.320420941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 29 04:42:05.321937 env[1189]: time="2025-10-29T04:42:05.321898021Z" level=info msg="CreateContainer within sandbox \"fc480abc3996b81d97583138f971d6f6a3fff82796a72ccb6427a2f0d5e18f02\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 29 04:42:05.339191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2062964545.mount: Deactivated successfully. Oct 29 04:42:05.346328 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount533450494.mount: Deactivated successfully. Oct 29 04:42:05.354324 env[1189]: time="2025-10-29T04:42:05.354279818Z" level=info msg="CreateContainer within sandbox \"fc480abc3996b81d97583138f971d6f6a3fff82796a72ccb6427a2f0d5e18f02\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d34da0f0c5611cf474ae828a2d2d882b76a2bbeb5ad8e8801499d5edea358382\"" Oct 29 04:42:05.355029 env[1189]: time="2025-10-29T04:42:05.354990892Z" level=info msg="StartContainer for \"d34da0f0c5611cf474ae828a2d2d882b76a2bbeb5ad8e8801499d5edea358382\"" Oct 29 04:42:05.409079 systemd[1]: Started cri-containerd-d34da0f0c5611cf474ae828a2d2d882b76a2bbeb5ad8e8801499d5edea358382.scope. Oct 29 04:42:05.464000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.470259 kernel: kauditd_printk_skb: 152 callbacks suppressed Oct 29 04:42:05.470461 kernel: audit: type=1400 audit(1761712925.464:505): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.464000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc8394922f8 items=0 ppid=1580 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.482145 kernel: audit: type=1300 audit(1761712925.464:505): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc8394922f8 items=0 ppid=1580 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.482262 kernel: audit: type=1327 audit(1761712925.464:505): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346461306630633536313163663437346165383238613264326438 Oct 29 04:42:05.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346461306630633536313163663437346165383238613264326438 Oct 29 04:42:05.488757 kernel: audit: type=1400 audit(1761712925.468:506): avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.493176 kernel: audit: type=1400 audit(1761712925.468:506): avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.503357 kernel: audit: type=1400 audit(1761712925.468:506): avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.508902 kernel: audit: type=1400 audit(1761712925.468:506): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.519080 kernel: audit: type=1400 audit(1761712925.468:506): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.519165 kernel: audit: type=1400 audit(1761712925.468:506): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.525774 kernel: audit: type=1400 audit(1761712925.468:506): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.468000 audit: BPF prog-id=72 op=LOAD Oct 29 04:42:05.468000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024c38 items=0 ppid=1580 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346461306630633536313163663437346165383238613264326438 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.482000 audit: BPF prog-id=73 op=LOAD Oct 29 04:42:05.482000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024c88 items=0 ppid=1580 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346461306630633536313163663437346165383238613264326438 Oct 29 04:42:05.497000 audit: BPF prog-id=73 op=UNLOAD Oct 29 04:42:05.497000 audit: BPF prog-id=72 op=UNLOAD Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:05.497000 audit: BPF prog-id=74 op=LOAD Oct 29 04:42:05.497000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024d18 items=0 ppid=1580 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346461306630633536313163663437346165383238613264326438 Oct 29 04:42:05.550214 env[1189]: time="2025-10-29T04:42:05.550128799Z" level=info msg="StartContainer for \"d34da0f0c5611cf474ae828a2d2d882b76a2bbeb5ad8e8801499d5edea358382\" returns successfully" Oct 29 04:42:05.740000 audit[1780]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.740000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc297eb110 a2=0 a3=7ffc297eb0fc items=0 ppid=1730 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 04:42:05.741000 audit[1781]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.741000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb059ec70 a2=0 a3=7fffb059ec5c items=0 ppid=1730 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 04:42:05.743000 audit[1782]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.743000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4bac88d0 a2=0 a3=7fff4bac88bc items=0 ppid=1730 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 04:42:05.743000 audit[1783]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:05.743000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb4087360 a2=0 a3=7ffeb408734c items=0 ppid=1730 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 04:42:05.745000 audit[1784]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:05.745000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed0103f10 a2=0 a3=7ffed0103efc items=0 ppid=1730 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 04:42:05.746000 audit[1785]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:05.746000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff163559d0 a2=0 a3=7fff163559bc items=0 ppid=1730 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 04:42:05.844000 audit[1787]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.844000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff3a2400b0 a2=0 a3=7fff3a24009c items=0 ppid=1730 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 04:42:05.849000 audit[1789]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.849000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff5a3f2d70 a2=0 a3=7fff5a3f2d5c items=0 ppid=1730 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 29 04:42:05.855000 audit[1792]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.855000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffa8e71ae0 a2=0 a3=7fffa8e71acc items=0 ppid=1730 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 29 04:42:05.857000 audit[1793]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.857000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd7069af0 a2=0 a3=7fffd7069adc items=0 ppid=1730 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 04:42:05.861000 audit[1795]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.861000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc589dbd90 a2=0 a3=7ffc589dbd7c items=0 ppid=1730 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 04:42:05.863000 audit[1796]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.863000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda4505d10 a2=0 a3=7ffda4505cfc items=0 ppid=1730 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 04:42:05.867000 audit[1798]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.867000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed8b58100 a2=0 a3=7ffed8b580ec items=0 ppid=1730 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 04:42:05.872000 audit[1801]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.872000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6b1e8170 a2=0 a3=7fff6b1e815c items=0 ppid=1730 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 29 04:42:05.875000 audit[1802]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.875000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8aa13d10 a2=0 a3=7ffc8aa13cfc items=0 ppid=1730 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 04:42:05.878000 audit[1804]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.878000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcba17d180 a2=0 a3=7ffcba17d16c items=0 ppid=1730 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 04:42:05.880000 audit[1805]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.880000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffced04ec60 a2=0 a3=7ffced04ec4c items=0 ppid=1730 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 04:42:05.884000 audit[1807]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.884000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6aaed9d0 a2=0 a3=7ffe6aaed9bc items=0 ppid=1730 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 04:42:05.890000 audit[1810]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.890000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffac3a76d0 a2=0 a3=7fffac3a76bc items=0 ppid=1730 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 04:42:05.896000 audit[1813]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.896000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5223b880 a2=0 a3=7ffe5223b86c items=0 ppid=1730 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 04:42:05.898000 audit[1814]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.898000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef4162380 a2=0 a3=7ffef416236c items=0 ppid=1730 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 04:42:05.902000 audit[1816]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.902000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff4e53b990 a2=0 a3=7fff4e53b97c items=0 ppid=1730 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:42:05.931000 audit[1820]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.931000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc5e901ed0 a2=0 a3=7ffc5e901ebc items=0 ppid=1730 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:42:05.933000 audit[1821]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.933000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe46cad440 a2=0 a3=7ffe46cad42c items=0 ppid=1730 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 04:42:05.936000 audit[1823]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:42:05.936000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc25cfb150 a2=0 a3=7ffc25cfb13c items=0 ppid=1730 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 04:42:05.977000 audit[1829]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:05.977000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff873a9310 a2=0 a3=7fff873a92fc items=0 ppid=1730 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:05.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:06.006000 audit[1829]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:06.006000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7fff873a9310 a2=0 a3=7fff873a92fc items=0 ppid=1730 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:06.027162 kubelet[1475]: E1029 04:42:06.027076 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:06.029000 audit[1838]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.029000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd05690c30 a2=0 a3=7ffd05690c1c items=0 ppid=1730 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 04:42:06.035000 audit[1840]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.035000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc44051a40 a2=0 a3=7ffc44051a2c items=0 ppid=1730 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 29 04:42:06.041000 audit[1843]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.041000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9ba83db0 a2=0 a3=7ffc9ba83d9c items=0 ppid=1730 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 29 04:42:06.043000 audit[1844]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.043000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0a4e3ce0 a2=0 a3=7ffe0a4e3ccc items=0 ppid=1730 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 04:42:06.046000 audit[1846]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.046000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda85f3b70 a2=0 a3=7ffda85f3b5c items=0 ppid=1730 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 04:42:06.048000 audit[1847]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.048000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9f3c3040 a2=0 a3=7fff9f3c302c items=0 ppid=1730 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 04:42:06.053000 audit[1849]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.053000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe55dcd3b0 a2=0 a3=7ffe55dcd39c items=0 ppid=1730 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 29 04:42:06.059000 audit[1852]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.059000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffd8f9fa20 a2=0 a3=7fffd8f9fa0c items=0 ppid=1730 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 04:42:06.061000 audit[1853]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.061000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb586c4e0 a2=0 a3=7ffdb586c4cc items=0 ppid=1730 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 04:42:06.065000 audit[1855]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.065000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc3b39cb0 a2=0 a3=7ffcc3b39c9c items=0 ppid=1730 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 04:42:06.067000 audit[1856]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.067000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9bb49750 a2=0 a3=7ffe9bb4973c items=0 ppid=1730 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 04:42:06.071000 audit[1858]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.071000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdbd5433c0 a2=0 a3=7ffdbd5433ac items=0 ppid=1730 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 04:42:06.076000 audit[1861]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.076000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe5d36530 a2=0 a3=7fffe5d3651c items=0 ppid=1730 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 04:42:06.082000 audit[1864]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.082000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff92bfe080 a2=0 a3=7fff92bfe06c items=0 ppid=1730 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 29 04:42:06.084000 audit[1865]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.084000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd0fbc42b0 a2=0 a3=7ffd0fbc429c items=0 ppid=1730 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 04:42:06.088000 audit[1867]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.088000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd8907c320 a2=0 a3=7ffd8907c30c items=0 ppid=1730 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:42:06.093000 audit[1870]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.093000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe5a1c1d50 a2=0 a3=7ffe5a1c1d3c items=0 ppid=1730 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:42:06.095000 audit[1871]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.095000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd90137e10 a2=0 a3=7ffd90137dfc items=0 ppid=1730 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 04:42:06.099000 audit[1873]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.099000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff506db0e0 a2=0 a3=7fff506db0cc items=0 ppid=1730 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 04:42:06.101000 audit[1874]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.101000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff56c2fd80 a2=0 a3=7fff56c2fd6c items=0 ppid=1730 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 04:42:06.105000 audit[1876]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.105000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff224882f0 a2=0 a3=7fff224882dc items=0 ppid=1730 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:42:06.111000 audit[1879]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:42:06.111000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe371575d0 a2=0 a3=7ffe371575bc items=0 ppid=1730 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:42:06.117000 audit[1881]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 04:42:06.117000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe6d1f98a0 a2=0 a3=7ffe6d1f988c items=0 ppid=1730 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.117000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:06.118000 audit[1881]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 04:42:06.118000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe6d1f98a0 a2=0 a3=7ffe6d1f988c items=0 ppid=1730 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.118000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:07.027529 kubelet[1475]: E1029 04:42:07.027438 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:07.273158 kubelet[1475]: E1029 04:42:07.272599 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:08.028533 kubelet[1475]: E1029 04:42:08.028371 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:09.029024 kubelet[1475]: E1029 04:42:09.028973 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:09.271267 kubelet[1475]: E1029 04:42:09.270908 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:10.029851 kubelet[1475]: E1029 04:42:10.029725 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:11.031358 kubelet[1475]: E1029 04:42:11.030828 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:11.132791 env[1189]: time="2025-10-29T04:42:11.132664902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:11.135018 env[1189]: time="2025-10-29T04:42:11.134975682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:11.139949 env[1189]: time="2025-10-29T04:42:11.139901309Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:11.141958 env[1189]: time="2025-10-29T04:42:11.141905043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:11.142911 env[1189]: time="2025-10-29T04:42:11.142865393Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 29 04:42:11.147850 env[1189]: time="2025-10-29T04:42:11.147797251Z" level=info msg="CreateContainer within sandbox \"df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 29 04:42:11.184605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount893349926.mount: Deactivated successfully. Oct 29 04:42:11.189598 env[1189]: time="2025-10-29T04:42:11.189541122Z" level=info msg="CreateContainer within sandbox \"df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566\"" Oct 29 04:42:11.190722 env[1189]: time="2025-10-29T04:42:11.190667553Z" level=info msg="StartContainer for \"5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566\"" Oct 29 04:42:11.216114 update_engine[1183]: I1029 04:42:11.215975 1183 update_attempter.cc:509] Updating boot flags... Oct 29 04:42:11.262787 systemd[1]: Started cri-containerd-5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566.scope. Oct 29 04:42:11.271317 kubelet[1475]: E1029 04:42:11.270939 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:11.320371 kernel: kauditd_printk_skb: 186 callbacks suppressed Oct 29 04:42:11.320586 kernel: audit: type=1400 audit(1761712931.309:562): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.309000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.333836 kernel: audit: type=1300 audit(1761712931.309:562): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff9c04dc7f8 items=0 ppid=1579 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:11.309000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff9c04dc7f8 items=0 ppid=1579 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:11.347302 kernel: audit: type=1327 audit(1761712931.309:562): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393963646338343435656162383636663831343031363664623665 Oct 29 04:42:11.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393963646338343435656162383636663831343031363664623665 Oct 29 04:42:11.359281 kernel: audit: type=1400 audit(1761712931.320:563): avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.359421 kernel: audit: type=1400 audit(1761712931.320:563): avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.374306 kernel: audit: type=1400 audit(1761712931.320:563): avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.387567 kernel: audit: type=1400 audit(1761712931.320:563): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.399976 kernel: audit: type=1400 audit(1761712931.320:563): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.400047 kernel: audit: type=1400 audit(1761712931.320:563): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.400289 env[1189]: time="2025-10-29T04:42:11.390857211Z" level=info msg="StartContainer for \"5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566\" returns successfully" Oct 29 04:42:11.406927 kernel: audit: type=1400 audit(1761712931.320:563): avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.320000 audit: BPF prog-id=75 op=LOAD Oct 29 04:42:11.320000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d7dc8 items=0 ppid=1579 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:11.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393963646338343435656162383636663831343031363664623665 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit: BPF prog-id=76 op=LOAD Oct 29 04:42:11.321000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d7e18 items=0 ppid=1579 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:11.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393963646338343435656162383636663831343031363664623665 Oct 29 04:42:11.321000 audit: BPF prog-id=76 op=UNLOAD Oct 29 04:42:11.321000 audit: BPF prog-id=75 op=UNLOAD Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { perfmon } for pid=1891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit[1891]: AVC avc: denied { bpf } for pid=1891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:11.321000 audit: BPF prog-id=77 op=LOAD Oct 29 04:42:11.321000 audit[1891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d7ea8 items=0 ppid=1579 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:11.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532393963646338343435656162383636663831343031363664623665 Oct 29 04:42:12.031126 kubelet[1475]: E1029 04:42:12.031065 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:12.181429 systemd[1]: run-containerd-runc-k8s.io-5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566-runc.i9usI7.mount: Deactivated successfully. Oct 29 04:42:12.359050 kubelet[1475]: I1029 04:42:12.358925 1475 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fzxpc" podStartSLOduration=10.616699615 podStartE2EDuration="15.358865729s" podCreationTimestamp="2025-10-29 04:41:57 +0000 UTC" firstStartedPulling="2025-10-29 04:42:00.577088605 +0000 UTC m=+4.465571271" lastFinishedPulling="2025-10-29 04:42:05.319254712 +0000 UTC m=+9.207737385" observedRunningTime="2025-10-29 04:42:06.331535769 +0000 UTC m=+10.220018455" watchObservedRunningTime="2025-10-29 04:42:12.358865729 +0000 UTC m=+16.247348402" Oct 29 04:42:12.765203 env[1189]: time="2025-10-29T04:42:12.764995371Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 04:42:12.769828 systemd[1]: cri-containerd-5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566.scope: Deactivated successfully. Oct 29 04:42:12.770175 systemd[1]: cri-containerd-5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566.scope: Consumed 1.239s CPU time. Oct 29 04:42:12.774000 audit: BPF prog-id=77 op=UNLOAD Oct 29 04:42:12.800453 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566-rootfs.mount: Deactivated successfully. Oct 29 04:42:12.851812 kubelet[1475]: I1029 04:42:12.850957 1475 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 29 04:42:12.977515 env[1189]: time="2025-10-29T04:42:12.977456731Z" level=info msg="shim disconnected" id=5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566 Oct 29 04:42:12.977906 env[1189]: time="2025-10-29T04:42:12.977873466Z" level=warning msg="cleaning up after shim disconnected" id=5299cdc8445eab866f8140166db6eec88831c2a04cb342489fcd6a3b82132566 namespace=k8s.io Oct 29 04:42:12.978067 env[1189]: time="2025-10-29T04:42:12.978038580Z" level=info msg="cleaning up dead shim" Oct 29 04:42:12.992889 env[1189]: time="2025-10-29T04:42:12.992821355Z" level=warning msg="cleanup warnings time=\"2025-10-29T04:42:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1944 runtime=io.containerd.runc.v2\n" Oct 29 04:42:13.032851 kubelet[1475]: E1029 04:42:13.032301 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:13.277139 systemd[1]: Created slice kubepods-besteffort-podc039d16b_2bfe_46ec_aef3_ee4416970de2.slice. Oct 29 04:42:13.283272 env[1189]: time="2025-10-29T04:42:13.282817735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-55g6q,Uid:c039d16b-2bfe-46ec-aef3-ee4416970de2,Namespace:calico-system,Attempt:0,}" Oct 29 04:42:13.339035 env[1189]: time="2025-10-29T04:42:13.338984911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 29 04:42:13.377629 env[1189]: time="2025-10-29T04:42:13.377522098Z" level=error msg="Failed to destroy network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:13.379965 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8-shm.mount: Deactivated successfully. Oct 29 04:42:13.380623 env[1189]: time="2025-10-29T04:42:13.380575360Z" level=error msg="encountered an error cleaning up failed sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:13.380828 env[1189]: time="2025-10-29T04:42:13.380781696Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-55g6q,Uid:c039d16b-2bfe-46ec-aef3-ee4416970de2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:13.381636 kubelet[1475]: E1029 04:42:13.381576 1475 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:13.382080 kubelet[1475]: E1029 04:42:13.381722 1475 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-55g6q" Oct 29 04:42:13.382080 kubelet[1475]: E1029 04:42:13.381784 1475 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-55g6q" Oct 29 04:42:13.382080 kubelet[1475]: E1029 04:42:13.381861 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-55g6q_calico-system(c039d16b-2bfe-46ec-aef3-ee4416970de2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-55g6q_calico-system(c039d16b-2bfe-46ec-aef3-ee4416970de2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:14.033402 kubelet[1475]: E1029 04:42:14.033337 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:14.340206 kubelet[1475]: I1029 04:42:14.340145 1475 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:14.341470 env[1189]: time="2025-10-29T04:42:14.341426363Z" level=info msg="StopPodSandbox for \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\"" Oct 29 04:42:14.376422 env[1189]: time="2025-10-29T04:42:14.376348763Z" level=error msg="StopPodSandbox for \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\" failed" error="failed to destroy network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:14.376789 kubelet[1475]: E1029 04:42:14.376652 1475 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:14.376931 kubelet[1475]: E1029 04:42:14.376761 1475 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8"} Oct 29 04:42:14.376931 kubelet[1475]: E1029 04:42:14.376837 1475 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c039d16b-2bfe-46ec-aef3-ee4416970de2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:42:14.376931 kubelet[1475]: E1029 04:42:14.376872 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c039d16b-2bfe-46ec-aef3-ee4416970de2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:15.033581 kubelet[1475]: E1029 04:42:15.033509 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:16.033839 kubelet[1475]: E1029 04:42:16.033619 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:16.095811 systemd[1]: Created slice kubepods-besteffort-pode54682e7_b522_4269_b179_f10a75e2e655.slice. Oct 29 04:42:16.227223 kubelet[1475]: I1029 04:42:16.227143 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vr22w\" (UniqueName: \"kubernetes.io/projected/e54682e7-b522-4269-b179-f10a75e2e655-kube-api-access-vr22w\") pod \"nginx-deployment-7fcdb87857-xmwqn\" (UID: \"e54682e7-b522-4269-b179-f10a75e2e655\") " pod="default/nginx-deployment-7fcdb87857-xmwqn" Oct 29 04:42:16.400805 env[1189]: time="2025-10-29T04:42:16.400733565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xmwqn,Uid:e54682e7-b522-4269-b179-f10a75e2e655,Namespace:default,Attempt:0,}" Oct 29 04:42:16.565483 env[1189]: time="2025-10-29T04:42:16.565399373Z" level=error msg="Failed to destroy network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:16.568124 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a-shm.mount: Deactivated successfully. Oct 29 04:42:16.569735 env[1189]: time="2025-10-29T04:42:16.569621117Z" level=error msg="encountered an error cleaning up failed sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:16.570014 env[1189]: time="2025-10-29T04:42:16.569959061Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xmwqn,Uid:e54682e7-b522-4269-b179-f10a75e2e655,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:16.571260 kubelet[1475]: E1029 04:42:16.570638 1475 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:16.571260 kubelet[1475]: E1029 04:42:16.570755 1475 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-xmwqn" Oct 29 04:42:16.571260 kubelet[1475]: E1029 04:42:16.570791 1475 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-xmwqn" Oct 29 04:42:16.571473 kubelet[1475]: E1029 04:42:16.570868 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-xmwqn_default(e54682e7-b522-4269-b179-f10a75e2e655)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-xmwqn_default(e54682e7-b522-4269-b179-f10a75e2e655)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-xmwqn" podUID="e54682e7-b522-4269-b179-f10a75e2e655" Oct 29 04:42:17.015141 kubelet[1475]: E1029 04:42:17.015087 1475 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:17.034062 kubelet[1475]: E1029 04:42:17.034030 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:17.364349 kubelet[1475]: I1029 04:42:17.364298 1475 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:17.365386 env[1189]: time="2025-10-29T04:42:17.365339015Z" level=info msg="StopPodSandbox for \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\"" Oct 29 04:42:17.410354 env[1189]: time="2025-10-29T04:42:17.410261038Z" level=error msg="StopPodSandbox for \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\" failed" error="failed to destroy network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:42:17.533267 kubelet[1475]: E1029 04:42:17.533171 1475 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:17.533485 kubelet[1475]: E1029 04:42:17.533286 1475 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a"} Oct 29 04:42:17.533485 kubelet[1475]: E1029 04:42:17.533348 1475 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e54682e7-b522-4269-b179-f10a75e2e655\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:42:17.534615 kubelet[1475]: E1029 04:42:17.534557 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e54682e7-b522-4269-b179-f10a75e2e655\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-xmwqn" podUID="e54682e7-b522-4269-b179-f10a75e2e655" Oct 29 04:42:18.034288 kubelet[1475]: E1029 04:42:18.034189 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:19.034567 kubelet[1475]: E1029 04:42:19.034506 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:20.035014 kubelet[1475]: E1029 04:42:20.034942 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:21.035437 kubelet[1475]: E1029 04:42:21.035365 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:22.035800 kubelet[1475]: E1029 04:42:22.035735 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:23.035926 kubelet[1475]: E1029 04:42:23.035869 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:24.036784 kubelet[1475]: E1029 04:42:24.036716 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:24.209181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1319064329.mount: Deactivated successfully. Oct 29 04:42:24.251926 env[1189]: time="2025-10-29T04:42:24.251834720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:24.254012 env[1189]: time="2025-10-29T04:42:24.253967948Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:24.256678 env[1189]: time="2025-10-29T04:42:24.256642434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:24.259125 env[1189]: time="2025-10-29T04:42:24.259047428Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:24.260124 env[1189]: time="2025-10-29T04:42:24.260011101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 29 04:42:24.284321 env[1189]: time="2025-10-29T04:42:24.284256282Z" level=info msg="CreateContainer within sandbox \"df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 29 04:42:24.301973 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3576388301.mount: Deactivated successfully. Oct 29 04:42:24.307266 env[1189]: time="2025-10-29T04:42:24.307209114Z" level=info msg="CreateContainer within sandbox \"df9f634958f163f20fe15e2187fb1180d3bc28e5ede9aa87d8a577e4890113cb\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4549793c89117323df96eb26a9fb88414294a76a08d6d7e920d41d24fd819258\"" Oct 29 04:42:24.308420 env[1189]: time="2025-10-29T04:42:24.308387695Z" level=info msg="StartContainer for \"4549793c89117323df96eb26a9fb88414294a76a08d6d7e920d41d24fd819258\"" Oct 29 04:42:24.333666 systemd[1]: Started cri-containerd-4549793c89117323df96eb26a9fb88414294a76a08d6d7e920d41d24fd819258.scope. Oct 29 04:42:24.378000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.390298 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 29 04:42:24.390560 kernel: audit: type=1400 audit(1761712944.378:569): avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.378000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f9a537651a8 items=0 ppid=1579 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435343937393363383931313733323364663936656232366139666238 Oct 29 04:42:24.405804 kernel: audit: type=1300 audit(1761712944.378:569): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f9a537651a8 items=0 ppid=1579 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:24.405875 kernel: audit: type=1327 audit(1761712944.378:569): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435343937393363383931313733323364663936656232366139666238 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.410907 kernel: audit: type=1400 audit(1761712944.382:570): avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.415821 kernel: audit: type=1400 audit(1761712944.382:570): avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.426663 kernel: audit: type=1400 audit(1761712944.382:570): avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.426820 kernel: audit: type=1400 audit(1761712944.382:570): avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.432736 kernel: audit: type=1400 audit(1761712944.382:570): avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.444970 kernel: audit: type=1400 audit(1761712944.382:570): avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.445103 kernel: audit: type=1400 audit(1761712944.382:570): avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.382000 audit: BPF prog-id=78 op=LOAD Oct 29 04:42:24.382000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000383c58 items=0 ppid=1579 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:24.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435343937393363383931313733323364663936656232366139666238 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.397000 audit: BPF prog-id=79 op=LOAD Oct 29 04:42:24.397000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000383ca8 items=0 ppid=1579 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:24.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435343937393363383931313733323364663936656232366139666238 Oct 29 04:42:24.404000 audit: BPF prog-id=79 op=UNLOAD Oct 29 04:42:24.404000 audit: BPF prog-id=78 op=UNLOAD Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:24.404000 audit: BPF prog-id=80 op=LOAD Oct 29 04:42:24.404000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000383d38 items=0 ppid=1579 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:24.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435343937393363383931313733323364663936656232366139666238 Oct 29 04:42:24.536863 env[1189]: time="2025-10-29T04:42:24.536763553Z" level=info msg="StartContainer for \"4549793c89117323df96eb26a9fb88414294a76a08d6d7e920d41d24fd819258\" returns successfully" Oct 29 04:42:24.618056 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 29 04:42:24.619600 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 29 04:42:25.038276 kubelet[1475]: E1029 04:42:25.038018 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:25.446119 systemd[1]: run-containerd-runc-k8s.io-4549793c89117323df96eb26a9fb88414294a76a08d6d7e920d41d24fd819258-runc.mOOzJ8.mount: Deactivated successfully. Oct 29 04:42:26.038854 kubelet[1475]: E1029 04:42:26.038766 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:26.254000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=21288 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:42:26.258000 audit[2169]: AVC avc: denied { write } for pid=2169 comm="tee" name="fd" dev="proc" ino=21716 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:42:26.263000 audit[2176]: AVC avc: denied { write } for pid=2176 comm="tee" name="fd" dev="proc" ino=21293 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:42:26.258000 audit[2169]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4c8127d4 a2=241 a3=1b6 items=1 ppid=2137 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.258000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 29 04:42:26.258000 audit: PATH item=0 name="/dev/fd/63" inode=21276 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:42:26.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:42:26.254000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc22c447d5 a2=241 a3=1b6 items=1 ppid=2148 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.254000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 29 04:42:26.254000 audit: PATH item=0 name="/dev/fd/63" inode=21279 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:42:26.254000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:42:26.268000 audit[2173]: AVC avc: denied { write } for pid=2173 comm="tee" name="fd" dev="proc" ino=21298 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:42:26.268000 audit[2173]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb18637d3 a2=241 a3=1b6 items=1 ppid=2134 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.268000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 29 04:42:26.268000 audit: PATH item=0 name="/dev/fd/63" inode=21280 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:42:26.268000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:42:26.263000 audit[2176]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda0a4c7c4 a2=241 a3=1b6 items=1 ppid=2136 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.263000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 29 04:42:26.263000 audit: PATH item=0 name="/dev/fd/63" inode=21284 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:42:26.263000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:42:26.272000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=21303 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:42:26.272000 audit[2193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8f3997d3 a2=241 a3=1b6 items=1 ppid=2139 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.272000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 29 04:42:26.272000 audit: PATH item=0 name="/dev/fd/63" inode=21296 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:42:26.272000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:42:26.284000 audit[2180]: AVC avc: denied { write } for pid=2180 comm="tee" name="fd" dev="proc" ino=21724 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:42:26.284000 audit[2180]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd4c8e7d3 a2=241 a3=1b6 items=1 ppid=2142 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.288000 audit[2178]: AVC avc: denied { write } for pid=2178 comm="tee" name="fd" dev="proc" ino=21728 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:42:26.284000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 29 04:42:26.284000 audit: PATH item=0 name="/dev/fd/63" inode=21713 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:42:26.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:42:26.288000 audit[2178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3eb037c3 a2=241 a3=1b6 items=1 ppid=2138 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.288000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 29 04:42:26.288000 audit: PATH item=0 name="/dev/fd/63" inode=21285 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:42:26.288000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:42:26.455064 systemd[1]: run-containerd-runc-k8s.io-4549793c89117323df96eb26a9fb88414294a76a08d6d7e920d41d24fd819258-runc.huymsW.mount: Deactivated successfully. Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.790000 audit: BPF prog-id=81 op=LOAD Oct 29 04:42:26.790000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd59b211a0 a2=98 a3=1fffffffffffffff items=0 ppid=2147 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.790000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:42:26.791000 audit: BPF prog-id=81 op=UNLOAD Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.792000 audit: BPF prog-id=82 op=LOAD Oct 29 04:42:26.792000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd59b21080 a2=94 a3=3 items=0 ppid=2147 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.792000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:42:26.792000 audit: BPF prog-id=82 op=UNLOAD Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.793000 audit: BPF prog-id=83 op=LOAD Oct 29 04:42:26.793000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd59b210c0 a2=94 a3=7ffd59b212a0 items=0 ppid=2147 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.793000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:42:26.794000 audit: BPF prog-id=83 op=UNLOAD Oct 29 04:42:26.794000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.794000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd59b21190 a2=50 a3=a000000085 items=0 ppid=2147 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.794000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.796000 audit: BPF prog-id=84 op=LOAD Oct 29 04:42:26.796000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb92065d0 a2=98 a3=3 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.797000 audit: BPF prog-id=84 op=UNLOAD Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.798000 audit: BPF prog-id=85 op=LOAD Oct 29 04:42:26.798000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb92063c0 a2=94 a3=54428f items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.799000 audit: BPF prog-id=85 op=UNLOAD Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.799000 audit: BPF prog-id=86 op=LOAD Oct 29 04:42:26.799000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb92063f0 a2=94 a3=2 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.799000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.800000 audit: BPF prog-id=86 op=UNLOAD Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit: BPF prog-id=87 op=LOAD Oct 29 04:42:26.967000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb92062b0 a2=94 a3=1 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.967000 audit: BPF prog-id=87 op=UNLOAD Oct 29 04:42:26.967000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.967000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcb9206380 a2=50 a3=7ffcb9206460 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.979000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.979000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb92062c0 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.979000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.979000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb92062f0 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb9206200 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb9206310 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb92062f0 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb92062e0 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb9206310 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb92062f0 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb9206310 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb92062e0 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb9206350 a2=28 a3=0 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb9206100 a2=50 a3=1 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit: BPF prog-id=88 op=LOAD Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb9206100 a2=94 a3=5 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit: BPF prog-id=88 op=UNLOAD Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb92061b0 a2=50 a3=1 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcb92062d0 a2=4 a3=38 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.980000 audit[2263]: AVC avc: denied { confidentiality } for pid=2263 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:42:26.980000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb9206320 a2=94 a3=6 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { confidentiality } for pid=2263 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:42:26.981000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb9205ad0 a2=94 a3=88 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.981000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:26.981000 audit[2263]: AVC avc: denied { confidentiality } for pid=2263 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:42:26.981000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb9205ad0 a2=94 a3=88 items=0 ppid=2147 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:26.981000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.000000 audit: BPF prog-id=89 op=LOAD Oct 29 04:42:27.000000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff71f3eb30 a2=98 a3=1999999999999999 items=0 ppid=2147 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.000000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 04:42:27.001000 audit: BPF prog-id=89 op=UNLOAD Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.002000 audit: BPF prog-id=90 op=LOAD Oct 29 04:42:27.002000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff71f3ea10 a2=94 a3=ffff items=0 ppid=2147 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.002000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 04:42:27.003000 audit: BPF prog-id=90 op=UNLOAD Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.003000 audit: BPF prog-id=91 op=LOAD Oct 29 04:42:27.003000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff71f3ea50 a2=94 a3=7fff71f3ec30 items=0 ppid=2147 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.003000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 04:42:27.004000 audit: BPF prog-id=91 op=UNLOAD Oct 29 04:42:27.040794 kubelet[1475]: E1029 04:42:27.040723 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:27.142370 systemd-networkd[1020]: vxlan.calico: Link UP Oct 29 04:42:27.142385 systemd-networkd[1020]: vxlan.calico: Gained carrier Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.188000 audit: BPF prog-id=92 op=LOAD Oct 29 04:42:27.188000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdadfa18b0 a2=98 a3=ffff items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.188000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.189000 audit: BPF prog-id=92 op=UNLOAD Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.189000 audit: BPF prog-id=93 op=LOAD Oct 29 04:42:27.189000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdadfa16c0 a2=94 a3=54428f items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.189000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.191000 audit: BPF prog-id=93 op=UNLOAD Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.191000 audit: BPF prog-id=94 op=LOAD Oct 29 04:42:27.191000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdadfa16f0 a2=94 a3=2 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.191000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.192000 audit: BPF prog-id=94 op=UNLOAD Oct 29 04:42:27.192000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.192000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdadfa15c0 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.192000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.192000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.192000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdadfa15f0 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.192000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdadfa1500 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdadfa1610 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdadfa15f0 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdadfa15e0 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdadfa1610 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdadfa15f0 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdadfa1610 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdadfa15e0 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdadfa1650 a2=28 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.193000 audit: BPF prog-id=95 op=LOAD Oct 29 04:42:27.193000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdadfa14c0 a2=94 a3=0 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.194000 audit: BPF prog-id=95 op=UNLOAD Oct 29 04:42:27.195000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.195000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdadfa14b0 a2=50 a3=2800 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdadfa14b0 a2=50 a3=2800 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit: BPF prog-id=96 op=LOAD Oct 29 04:42:27.198000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdadfa0cd0 a2=94 a3=2 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.198000 audit: BPF prog-id=96 op=UNLOAD Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.198000 audit: BPF prog-id=97 op=LOAD Oct 29 04:42:27.198000 audit[2292]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdadfa0dd0 a2=94 a3=30 items=0 ppid=2147 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.203000 audit: BPF prog-id=98 op=LOAD Oct 29 04:42:27.203000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff28adeea0 a2=98 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.203000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.203000 audit: BPF prog-id=98 op=UNLOAD Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit: BPF prog-id=99 op=LOAD Oct 29 04:42:27.204000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff28adec90 a2=94 a3=54428f items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.204000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.204000 audit: BPF prog-id=99 op=UNLOAD Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.204000 audit: BPF prog-id=100 op=LOAD Oct 29 04:42:27.204000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff28adecc0 a2=94 a3=2 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.204000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.204000 audit: BPF prog-id=100 op=UNLOAD Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.383000 audit: BPF prog-id=101 op=LOAD Oct 29 04:42:27.383000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff28adeb80 a2=94 a3=1 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.383000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.384000 audit: BPF prog-id=101 op=UNLOAD Oct 29 04:42:27.385000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.385000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff28adec50 a2=50 a3=7fff28aded30 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.385000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.397000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.397000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff28adeb90 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.397000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.397000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff28adebc0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.397000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.397000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff28adead0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.398000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.398000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff28adebe0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.398000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.398000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff28adebc0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.399000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.399000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff28adebb0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.399000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.399000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff28adebe0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.399000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.399000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff28adebc0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.399000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.399000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff28adebe0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.399000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.399000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff28adebb0 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.399000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.399000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff28adec20 a2=28 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff28ade9d0 a2=50 a3=1 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.400000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit: BPF prog-id=102 op=LOAD Oct 29 04:42:27.400000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff28ade9d0 a2=94 a3=5 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.400000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.400000 audit: BPF prog-id=102 op=UNLOAD Oct 29 04:42:27.400000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.400000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff28adea80 a2=50 a3=1 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.400000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.401000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.401000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff28adeba0 a2=4 a3=38 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.401000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.401000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.401000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.401000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.401000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff28adebf0 a2=94 a3=6 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { confidentiality } for pid=2295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:42:27.403000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff28ade3a0 a2=94 a3=88 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.403000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.403000 audit[2295]: AVC avc: denied { confidentiality } for pid=2295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:42:27.403000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff28ade3a0 a2=94 a3=88 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.403000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.404000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.404000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff28adfdd0 a2=10 a3=f8f00800 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.404000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.405000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.405000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff28adfc70 a2=10 a3=3 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.405000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.405000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff28adfc10 a2=10 a3=3 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.405000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:27.405000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff28adfc10 a2=10 a3=7 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:42:27.413000 audit: BPF prog-id=97 op=UNLOAD Oct 29 04:42:27.413000 audit[1170]: SYSCALL arch=c000003e syscall=46 success=yes exit=1176 a0=10 a1=7ffd48341710 a2=4000 a3=f8d1bb59cb8e0284 items=0 ppid=1 pid=1170 auid=4294967295 uid=201 gid=201 euid=201 suid=201 fsuid=201 egid=201 sgid=201 fsgid=201 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F646275732D6461656D6F6E002D2D73797374656D002D2D616464726573733D73797374656D643A002D2D6E6F666F726B002D2D6E6F70696466696C65002D2D73797374656D642D61637469766174696F6E002D2D7379736C6F672D6F6E6C79 Oct 29 04:42:27.459067 systemd[1]: run-containerd-runc-k8s.io-4549793c89117323df96eb26a9fb88414294a76a08d6d7e920d41d24fd819258-runc.6e5dxB.mount: Deactivated successfully. Oct 29 04:42:27.534000 audit[2358]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:27.534000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc32594da0 a2=0 a3=7ffc32594d8c items=0 ppid=2147 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.534000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:27.549000 audit[2354]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:27.549000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc7c477ad0 a2=0 a3=7ffc7c477abc items=0 ppid=2147 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.549000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:27.551000 audit[2355]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:27.551000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe956ddbf0 a2=0 a3=7ffe956ddbdc items=0 ppid=2147 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.551000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:27.553000 audit[2356]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:27.553000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd976fd920 a2=0 a3=7ffd976fd90c items=0 ppid=2147 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:27.553000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:28.041066 kubelet[1475]: E1029 04:42:28.040910 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:28.611932 systemd-networkd[1020]: vxlan.calico: Gained IPv6LL Oct 29 04:42:29.041376 kubelet[1475]: E1029 04:42:29.041132 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:29.271478 env[1189]: time="2025-10-29T04:42:29.271375281Z" level=info msg="StopPodSandbox for \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\"" Oct 29 04:42:29.272435 env[1189]: time="2025-10-29T04:42:29.271310464Z" level=info msg="StopPodSandbox for \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\"" Oct 29 04:42:29.415019 kubelet[1475]: I1029 04:42:29.414568 1475 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-mxt9n" podStartSLOduration=8.727338816 podStartE2EDuration="32.414441371s" podCreationTimestamp="2025-10-29 04:41:57 +0000 UTC" firstStartedPulling="2025-10-29 04:42:00.574948637 +0000 UTC m=+4.463431303" lastFinishedPulling="2025-10-29 04:42:24.262051199 +0000 UTC m=+28.150533858" observedRunningTime="2025-10-29 04:42:25.445399397 +0000 UTC m=+29.333882080" watchObservedRunningTime="2025-10-29 04:42:29.414441371 +0000 UTC m=+33.302924041" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.424 [INFO][2393] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.424 [INFO][2393] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" iface="eth0" netns="/var/run/netns/cni-a8fe13aa-0252-d259-e396-1dd93c77bf9f" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.425 [INFO][2393] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" iface="eth0" netns="/var/run/netns/cni-a8fe13aa-0252-d259-e396-1dd93c77bf9f" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.425 [INFO][2393] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" iface="eth0" netns="/var/run/netns/cni-a8fe13aa-0252-d259-e396-1dd93c77bf9f" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.425 [INFO][2393] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.425 [INFO][2393] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.549 [INFO][2407] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.550 [INFO][2407] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.550 [INFO][2407] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.568 [WARNING][2407] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.568 [INFO][2407] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.571 [INFO][2407] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:29.575826 env[1189]: 2025-10-29 04:42:29.574 [INFO][2393] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:29.580452 systemd[1]: run-netns-cni\x2da8fe13aa\x2d0252\x2dd259\x2de396\x2d1dd93c77bf9f.mount: Deactivated successfully. Oct 29 04:42:29.582882 env[1189]: time="2025-10-29T04:42:29.580571574Z" level=info msg="TearDown network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\" successfully" Oct 29 04:42:29.582882 env[1189]: time="2025-10-29T04:42:29.580635018Z" level=info msg="StopPodSandbox for \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\" returns successfully" Oct 29 04:42:29.585369 env[1189]: time="2025-10-29T04:42:29.584980567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-55g6q,Uid:c039d16b-2bfe-46ec-aef3-ee4416970de2,Namespace:calico-system,Attempt:1,}" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.416 [INFO][2392] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.417 [INFO][2392] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" iface="eth0" netns="/var/run/netns/cni-045235aa-387f-4093-5cb8-a45fe24e121e" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.418 [INFO][2392] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" iface="eth0" netns="/var/run/netns/cni-045235aa-387f-4093-5cb8-a45fe24e121e" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.418 [INFO][2392] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" iface="eth0" netns="/var/run/netns/cni-045235aa-387f-4093-5cb8-a45fe24e121e" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.419 [INFO][2392] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.419 [INFO][2392] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.549 [INFO][2405] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.550 [INFO][2405] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.570 [INFO][2405] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.588 [WARNING][2405] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.588 [INFO][2405] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.596 [INFO][2405] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:29.608096 env[1189]: 2025-10-29 04:42:29.602 [INFO][2392] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:29.611406 systemd[1]: run-netns-cni\x2d045235aa\x2d387f\x2d4093\x2d5cb8\x2da45fe24e121e.mount: Deactivated successfully. Oct 29 04:42:29.625345 env[1189]: time="2025-10-29T04:42:29.624868964Z" level=info msg="TearDown network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\" successfully" Oct 29 04:42:29.625345 env[1189]: time="2025-10-29T04:42:29.624973913Z" level=info msg="StopPodSandbox for \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\" returns successfully" Oct 29 04:42:29.645283 env[1189]: time="2025-10-29T04:42:29.645206396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xmwqn,Uid:e54682e7-b522-4269-b179-f10a75e2e655,Namespace:default,Attempt:1,}" Oct 29 04:42:29.837169 systemd-networkd[1020]: cali557560cf9bd: Link UP Oct 29 04:42:29.842231 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 04:42:29.842378 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali557560cf9bd: link becomes ready Oct 29 04:42:29.842399 systemd-networkd[1020]: cali557560cf9bd: Gained carrier Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.693 [INFO][2418] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.243.77.174-k8s-csi--node--driver--55g6q-eth0 csi-node-driver- calico-system c039d16b-2bfe-46ec-aef3-ee4416970de2 1389 0 2025-10-29 04:41:57 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.243.77.174 csi-node-driver-55g6q eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali557560cf9bd [] [] }} ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.694 [INFO][2418] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.739 [INFO][2442] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" HandleID="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.740 [INFO][2442] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" HandleID="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d120), Attrs:map[string]string{"namespace":"calico-system", "node":"10.243.77.174", "pod":"csi-node-driver-55g6q", "timestamp":"2025-10-29 04:42:29.73989088 +0000 UTC"}, Hostname:"10.243.77.174", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.740 [INFO][2442] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.740 [INFO][2442] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.740 [INFO][2442] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.243.77.174' Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.753 [INFO][2442] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.774 [INFO][2442] ipam/ipam.go 394: Looking up existing affinities for host host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.781 [INFO][2442] ipam/ipam.go 511: Trying affinity for 192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.783 [INFO][2442] ipam/ipam.go 158: Attempting to load block cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.786 [INFO][2442] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.786 [INFO][2442] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.92.64/26 handle="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.789 [INFO][2442] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433 Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.817 [INFO][2442] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.92.64/26 handle="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.823 [INFO][2442] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.92.65/26] block=192.168.92.64/26 handle="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.823 [INFO][2442] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.92.65/26] handle="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" host="10.243.77.174" Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.824 [INFO][2442] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:29.863441 env[1189]: 2025-10-29 04:42:29.824 [INFO][2442] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.92.65/26] IPv6=[] ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" HandleID="k8s-pod-network.2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.866086 env[1189]: 2025-10-29 04:42:29.827 [INFO][2418] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-csi--node--driver--55g6q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c039d16b-2bfe-46ec-aef3-ee4416970de2", ResourceVersion:"1389", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 41, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"", Pod:"csi-node-driver-55g6q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.92.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali557560cf9bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:29.866086 env[1189]: 2025-10-29 04:42:29.827 [INFO][2418] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.92.65/32] ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.866086 env[1189]: 2025-10-29 04:42:29.827 [INFO][2418] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali557560cf9bd ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.866086 env[1189]: 2025-10-29 04:42:29.843 [INFO][2418] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.866086 env[1189]: 2025-10-29 04:42:29.844 [INFO][2418] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-csi--node--driver--55g6q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c039d16b-2bfe-46ec-aef3-ee4416970de2", ResourceVersion:"1389", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 41, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433", Pod:"csi-node-driver-55g6q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.92.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali557560cf9bd", MAC:"da:4f:bc:bf:1d:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:29.866086 env[1189]: 2025-10-29 04:42:29.857 [INFO][2418] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433" Namespace="calico-system" Pod="csi-node-driver-55g6q" WorkloadEndpoint="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:29.888733 env[1189]: time="2025-10-29T04:42:29.888598914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:42:29.889006 env[1189]: time="2025-10-29T04:42:29.888947636Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:42:29.889216 env[1189]: time="2025-10-29T04:42:29.889159343Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:42:29.889819 env[1189]: time="2025-10-29T04:42:29.889764703Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433 pid=2475 runtime=io.containerd.runc.v2 Oct 29 04:42:29.912972 systemd[1]: Started cri-containerd-2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433.scope. Oct 29 04:42:29.897000 audit[2471]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:29.946203 kernel: kauditd_printk_skb: 606 callbacks suppressed Oct 29 04:42:29.946315 kernel: audit: type=1325 audit(1761712949.897:684): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:29.897000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe764bcca0 a2=0 a3=7ffe764bcc8c items=0 ppid=2147 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:29.967867 kernel: audit: type=1300 audit(1761712949.897:684): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe764bcca0 a2=0 a3=7ffe764bcc8c items=0 ppid=2147 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:29.974328 systemd-networkd[1020]: cali69b38d442bc: Link UP Oct 29 04:42:29.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:29.985728 kernel: audit: type=1327 audit(1761712949.897:684): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:29.985981 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali69b38d442bc: link becomes ready Oct 29 04:42:29.984097 systemd-networkd[1020]: cali69b38d442bc: Gained carrier Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.005076 kernel: audit: type=1400 audit(1761712949.994:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.005171 kernel: audit: type=1400 audit(1761712949.994:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.005233 kernel: audit: type=1400 audit(1761712949.994:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014982 kernel: audit: type=1400 audit(1761712949.994:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015792 kernel: audit: type=1400 audit(1761712949.994:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.728 [INFO][2428] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0 nginx-deployment-7fcdb87857- default e54682e7-b522-4269-b179-f10a75e2e655 1388 0 2025-10-29 04:42:16 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.243.77.174 nginx-deployment-7fcdb87857-xmwqn eth0 default [] [] [kns.default ksa.default.default] cali69b38d442bc [] [] }} ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.729 [INFO][2428] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.769 [INFO][2450] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" HandleID="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.769 [INFO][2450] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" HandleID="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251b70), Attrs:map[string]string{"namespace":"default", "node":"10.243.77.174", "pod":"nginx-deployment-7fcdb87857-xmwqn", "timestamp":"2025-10-29 04:42:29.769613507 +0000 UTC"}, Hostname:"10.243.77.174", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.769 [INFO][2450] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.824 [INFO][2450] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.824 [INFO][2450] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.243.77.174' Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.867 [INFO][2450] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.877 [INFO][2450] ipam/ipam.go 394: Looking up existing affinities for host host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.893 [INFO][2450] ipam/ipam.go 511: Trying affinity for 192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.897 [INFO][2450] ipam/ipam.go 158: Attempting to load block cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.901 [INFO][2450] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.901 [INFO][2450] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.92.64/26 handle="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.905 [INFO][2450] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98 Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.911 [INFO][2450] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.92.64/26 handle="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.925 [INFO][2450] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.92.66/26] block=192.168.92.64/26 handle="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.925 [INFO][2450] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.92.66/26] handle="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" host="10.243.77.174" Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.925 [INFO][2450] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:30.029443 env[1189]: 2025-10-29 04:42:29.925 [INFO][2450] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.92.66/26] IPv6=[] ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" HandleID="k8s-pod-network.981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:30.030988 kernel: audit: type=1400 audit(1761712949.994:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.031076 env[1189]: 2025-10-29 04:42:29.953 [INFO][2428] cni-plugin/k8s.go 418: Populated endpoint ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e54682e7-b522-4269-b179-f10a75e2e655", ResourceVersion:"1388", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-xmwqn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali69b38d442bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:30.031076 env[1189]: 2025-10-29 04:42:29.953 [INFO][2428] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.92.66/32] ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:30.031076 env[1189]: 2025-10-29 04:42:29.953 [INFO][2428] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali69b38d442bc ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:30.031076 env[1189]: 2025-10-29 04:42:29.991 [INFO][2428] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:30.031076 env[1189]: 2025-10-29 04:42:29.992 [INFO][2428] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e54682e7-b522-4269-b179-f10a75e2e655", ResourceVersion:"1388", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98", Pod:"nginx-deployment-7fcdb87857-xmwqn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali69b38d442bc", MAC:"42:71:64:b1:8b:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:30.031076 env[1189]: 2025-10-29 04:42:30.015 [INFO][2428] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98" Namespace="default" Pod="nginx-deployment-7fcdb87857-xmwqn" WorkloadEndpoint="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.070429 kubelet[1475]: E1029 04:42:30.070312 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:30.071106 kernel: audit: type=1400 audit(1761712949.994:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:29.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.010000 audit: BPF prog-id=103 op=LOAD Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2475 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265623466353361396365616231323561303861613861366430663534 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2475 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265623466353361396365616231323561303861613861366430663534 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.011000 audit: BPF prog-id=104 op=LOAD Oct 29 04:42:30.011000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ef50 items=0 ppid=2475 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265623466353361396365616231323561303861613861366430663534 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.014000 audit: BPF prog-id=105 op=LOAD Oct 29 04:42:30.014000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028ef98 items=0 ppid=2475 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265623466353361396365616231323561303861613861366430663534 Oct 29 04:42:30.015000 audit: BPF prog-id=105 op=UNLOAD Oct 29 04:42:30.015000 audit: BPF prog-id=104 op=UNLOAD Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.015000 audit: BPF prog-id=106 op=LOAD Oct 29 04:42:30.015000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028f3a8 items=0 ppid=2475 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265623466353361396365616231323561303861613861366430663534 Oct 29 04:42:30.110809 env[1189]: time="2025-10-29T04:42:30.110527936Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:42:30.110809 env[1189]: time="2025-10-29T04:42:30.110583304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:42:30.110809 env[1189]: time="2025-10-29T04:42:30.110600436Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:42:30.115014 env[1189]: time="2025-10-29T04:42:30.110955499Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98 pid=2521 runtime=io.containerd.runc.v2 Oct 29 04:42:30.116662 env[1189]: time="2025-10-29T04:42:30.115583731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-55g6q,Uid:c039d16b-2bfe-46ec-aef3-ee4416970de2,Namespace:calico-system,Attempt:1,} returns sandbox id \"2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433\"" Oct 29 04:42:30.121288 env[1189]: time="2025-10-29T04:42:30.121141875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 04:42:30.131000 audit[2540]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:30.131000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffe8e4f8b00 a2=0 a3=7ffe8e4f8aec items=0 ppid=2147 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.131000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:30.145389 systemd[1]: Started cri-containerd-981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98.scope. Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.167000 audit: BPF prog-id=107 op=LOAD Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938313432363438356635353130376431386265396136653332333533 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938313432363438356635353130376431386265396136653332333533 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit: BPF prog-id=108 op=LOAD Oct 29 04:42:30.169000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000348f50 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938313432363438356635353130376431386265396136653332333533 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit: BPF prog-id=109 op=LOAD Oct 29 04:42:30.169000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000348f98 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938313432363438356635353130376431386265396136653332333533 Oct 29 04:42:30.169000 audit: BPF prog-id=109 op=UNLOAD Oct 29 04:42:30.169000 audit: BPF prog-id=108 op=UNLOAD Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:30.169000 audit: BPF prog-id=110 op=LOAD Oct 29 04:42:30.169000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003493a8 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:30.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938313432363438356635353130376431386265396136653332333533 Oct 29 04:42:30.213435 env[1189]: time="2025-10-29T04:42:30.213378548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xmwqn,Uid:e54682e7-b522-4269-b179-f10a75e2e655,Namespace:default,Attempt:1,} returns sandbox id \"981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98\"" Oct 29 04:42:30.441928 env[1189]: time="2025-10-29T04:42:30.441737329Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:30.444500 env[1189]: time="2025-10-29T04:42:30.444365366Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 04:42:30.444912 kubelet[1475]: E1029 04:42:30.444835 1475 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:30.445200 kubelet[1475]: E1029 04:42:30.445100 1475 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:30.445914 kubelet[1475]: E1029 04:42:30.445799 1475 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65fdj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-55g6q_calico-system(c039d16b-2bfe-46ec-aef3-ee4416970de2): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:30.446190 env[1189]: time="2025-10-29T04:42:30.446129964Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 29 04:42:31.071176 kubelet[1475]: E1029 04:42:31.071053 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:31.172074 systemd-networkd[1020]: cali69b38d442bc: Gained IPv6LL Oct 29 04:42:31.555424 systemd-networkd[1020]: cali557560cf9bd: Gained IPv6LL Oct 29 04:42:32.071406 kubelet[1475]: E1029 04:42:32.071269 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:33.072358 kubelet[1475]: E1029 04:42:33.072306 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:34.073296 kubelet[1475]: E1029 04:42:34.073209 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:35.074090 kubelet[1475]: E1029 04:42:35.074026 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:35.168009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1316553352.mount: Deactivated successfully. Oct 29 04:42:36.075053 kubelet[1475]: E1029 04:42:36.074968 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:37.014796 kubelet[1475]: E1029 04:42:37.014663 1475 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:37.075667 kubelet[1475]: E1029 04:42:37.075586 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:37.880818 env[1189]: time="2025-10-29T04:42:37.880752262Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:37.883562 env[1189]: time="2025-10-29T04:42:37.883527209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:37.886162 env[1189]: time="2025-10-29T04:42:37.886102647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:37.889516 env[1189]: time="2025-10-29T04:42:37.889475447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:37.891469 env[1189]: time="2025-10-29T04:42:37.891429029Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 29 04:42:37.894972 env[1189]: time="2025-10-29T04:42:37.894908913Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 04:42:37.896595 env[1189]: time="2025-10-29T04:42:37.896558285Z" level=info msg="CreateContainer within sandbox \"981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 29 04:42:37.911300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2691337904.mount: Deactivated successfully. Oct 29 04:42:37.921892 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount422039768.mount: Deactivated successfully. Oct 29 04:42:37.924390 env[1189]: time="2025-10-29T04:42:37.924304354Z" level=info msg="CreateContainer within sandbox \"981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3080127bd703ac7894cf6b0be6178d7bb1d2f68304db09a870a09755c91c39d3\"" Oct 29 04:42:37.925642 env[1189]: time="2025-10-29T04:42:37.925593093Z" level=info msg="StartContainer for \"3080127bd703ac7894cf6b0be6178d7bb1d2f68304db09a870a09755c91c39d3\"" Oct 29 04:42:37.962057 systemd[1]: Started cri-containerd-3080127bd703ac7894cf6b0be6178d7bb1d2f68304db09a870a09755c91c39d3.scope. Oct 29 04:42:38.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.008274 kernel: kauditd_printk_skb: 110 callbacks suppressed Oct 29 04:42:38.008414 kernel: audit: type=1400 audit(1761712958.000:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.025148 kernel: audit: type=1400 audit(1761712958.000:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.025285 kernel: audit: type=1400 audit(1761712958.012:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.025346 kernel: audit: type=1400 audit(1761712958.012:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.035841 kernel: audit: type=1400 audit(1761712958.012:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.047206 kernel: audit: type=1400 audit(1761712958.012:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.047322 kernel: audit: type=1400 audit(1761712958.012:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.047381 kernel: audit: type=1400 audit(1761712958.012:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.053642 kernel: audit: type=1400 audit(1761712958.012:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.063842 kernel: audit: type=1400 audit(1761712958.013:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.013000 audit: BPF prog-id=111 op=LOAD Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2521 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330383031323762643730336163373839346366366230626536313738 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2521 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330383031323762643730336163373839346366366230626536313738 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.016000 audit: BPF prog-id=112 op=LOAD Oct 29 04:42:38.016000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002094f0 items=0 ppid=2521 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:38.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330383031323762643730336163373839346366366230626536313738 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.020000 audit: BPF prog-id=113 op=LOAD Oct 29 04:42:38.020000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000209538 items=0 ppid=2521 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:38.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330383031323762643730336163373839346366366230626536313738 Oct 29 04:42:38.029000 audit: BPF prog-id=113 op=UNLOAD Oct 29 04:42:38.029000 audit: BPF prog-id=112 op=UNLOAD Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:38.029000 audit: BPF prog-id=114 op=LOAD Oct 29 04:42:38.029000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000209948 items=0 ppid=2521 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:38.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330383031323762643730336163373839346366366230626536313738 Oct 29 04:42:38.076846 kubelet[1475]: E1029 04:42:38.076749 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:38.089882 env[1189]: time="2025-10-29T04:42:38.089801180Z" level=info msg="StartContainer for \"3080127bd703ac7894cf6b0be6178d7bb1d2f68304db09a870a09755c91c39d3\" returns successfully" Oct 29 04:42:38.214790 env[1189]: time="2025-10-29T04:42:38.214560309Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:38.216632 env[1189]: time="2025-10-29T04:42:38.216545827Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 04:42:38.217252 kubelet[1475]: E1029 04:42:38.217090 1475 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:38.217252 kubelet[1475]: E1029 04:42:38.217174 1475 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:38.217462 kubelet[1475]: E1029 04:42:38.217369 1475 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65fdj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-55g6q_calico-system(c039d16b-2bfe-46ec-aef3-ee4416970de2): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:38.218936 kubelet[1475]: E1029 04:42:38.218890 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:38.451911 kubelet[1475]: E1029 04:42:38.451842 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:39.077637 kubelet[1475]: E1029 04:42:39.077576 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:40.078784 kubelet[1475]: E1029 04:42:40.078704 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:41.079174 kubelet[1475]: E1029 04:42:41.079113 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:42.080134 kubelet[1475]: E1029 04:42:42.080076 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:43.081759 kubelet[1475]: E1029 04:42:43.081657 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:43.992000 audit[2635]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:43.997903 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 29 04:42:43.998055 kernel: audit: type=1325 audit(1761712963.992:740): table=filter:71 family=2 entries=26 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:43.992000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffcb6ff2360 a2=0 a3=7ffcb6ff234c items=0 ppid=1730 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.009319 kernel: audit: type=1300 audit(1761712963.992:740): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffcb6ff2360 a2=0 a3=7ffcb6ff234c items=0 ppid=1730 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.009489 kernel: audit: type=1327 audit(1761712963.992:740): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:43.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.013013 kernel: audit: type=1325 audit(1761712964.011:741): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.011000 audit[2635]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.011000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb6ff2360 a2=0 a3=0 items=0 ppid=1730 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.024214 kernel: audit: type=1300 audit(1761712964.011:741): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb6ff2360 a2=0 a3=0 items=0 ppid=1730 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.024336 kernel: audit: type=1327 audit(1761712964.011:741): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.040000 audit[2637]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.040000 audit[2637]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc94a54c50 a2=0 a3=7ffc94a54c3c items=0 ppid=1730 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.052903 kernel: audit: type=1325 audit(1761712964.040:742): table=filter:73 family=2 entries=38 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.053103 kernel: audit: type=1300 audit(1761712964.040:742): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc94a54c50 a2=0 a3=7ffc94a54c3c items=0 ppid=1730 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.053185 kernel: audit: type=1327 audit(1761712964.040:742): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.058000 audit[2637]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.058000 audit[2637]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc94a54c50 a2=0 a3=0 items=0 ppid=1730 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.063757 kernel: audit: type=1325 audit(1761712964.058:743): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.082170 kubelet[1475]: E1029 04:42:44.082046 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:44.167478 kubelet[1475]: I1029 04:42:44.167366 1475 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-xmwqn" podStartSLOduration=20.48913925 podStartE2EDuration="28.167334199s" podCreationTimestamp="2025-10-29 04:42:16 +0000 UTC" firstStartedPulling="2025-10-29 04:42:30.215052971 +0000 UTC m=+34.103535630" lastFinishedPulling="2025-10-29 04:42:37.893247908 +0000 UTC m=+41.781730579" observedRunningTime="2025-10-29 04:42:38.482416642 +0000 UTC m=+42.370899312" watchObservedRunningTime="2025-10-29 04:42:44.167334199 +0000 UTC m=+48.055816917" Oct 29 04:42:44.176708 systemd[1]: Created slice kubepods-besteffort-pod0d7e4f64_55fe_42cc_9b1d_7a8b8fdba967.slice. Oct 29 04:42:44.234366 kubelet[1475]: I1029 04:42:44.234186 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q2phl\" (UniqueName: \"kubernetes.io/projected/0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967-kube-api-access-q2phl\") pod \"nfs-server-provisioner-0\" (UID: \"0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967\") " pod="default/nfs-server-provisioner-0" Oct 29 04:42:44.234366 kubelet[1475]: I1029 04:42:44.234269 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967-data\") pod \"nfs-server-provisioner-0\" (UID: \"0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967\") " pod="default/nfs-server-provisioner-0" Oct 29 04:42:44.482735 env[1189]: time="2025-10-29T04:42:44.482593189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967,Namespace:default,Attempt:0,}" Oct 29 04:42:44.765356 systemd-networkd[1020]: cali60e51b789ff: Link UP Oct 29 04:42:44.772975 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 04:42:44.779740 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 29 04:42:44.777911 systemd-networkd[1020]: cali60e51b789ff: Gained carrier Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.580 [INFO][2640] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.243.77.174-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967 1479 0 2025-10-29 04:42:44 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.243.77.174 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.581 [INFO][2640] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.654 [INFO][2652] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" HandleID="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Workload="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.654 [INFO][2652] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" HandleID="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Workload="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1800), Attrs:map[string]string{"namespace":"default", "node":"10.243.77.174", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-29 04:42:44.654069117 +0000 UTC"}, Hostname:"10.243.77.174", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.654 [INFO][2652] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.654 [INFO][2652] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.655 [INFO][2652] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.243.77.174' Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.670 [INFO][2652] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.689 [INFO][2652] ipam/ipam.go 394: Looking up existing affinities for host host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.699 [INFO][2652] ipam/ipam.go 511: Trying affinity for 192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.706 [INFO][2652] ipam/ipam.go 158: Attempting to load block cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.724 [INFO][2652] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.724 [INFO][2652] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.92.64/26 handle="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.737 [INFO][2652] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05 Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.746 [INFO][2652] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.92.64/26 handle="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.756 [INFO][2652] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.92.67/26] block=192.168.92.64/26 handle="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.756 [INFO][2652] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.92.67/26] handle="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" host="10.243.77.174" Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.757 [INFO][2652] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:44.803905 env[1189]: 2025-10-29 04:42:44.757 [INFO][2652] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.92.67/26] IPv6=[] ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" HandleID="k8s-pod-network.e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Workload="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" Oct 29 04:42:44.805653 env[1189]: 2025-10-29 04:42:44.759 [INFO][2640] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967", ResourceVersion:"1479", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.92.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:44.805653 env[1189]: 2025-10-29 04:42:44.759 [INFO][2640] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.92.67/32] ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" Oct 29 04:42:44.805653 env[1189]: 2025-10-29 04:42:44.759 [INFO][2640] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" Oct 29 04:42:44.805653 env[1189]: 2025-10-29 04:42:44.780 [INFO][2640] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" Oct 29 04:42:44.806074 env[1189]: 2025-10-29 04:42:44.783 [INFO][2640] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967", ResourceVersion:"1479", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.92.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1a:6f:c8:7e:3a:88", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:44.806074 env[1189]: 2025-10-29 04:42:44.800 [INFO][2640] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.243.77.174-k8s-nfs--server--provisioner--0-eth0" Oct 29 04:42:44.832000 audit[2671]: NETFILTER_CFG table=filter:75 family=2 entries=46 op=nft_register_chain pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:42:44.832000 audit[2671]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7ffd28cc1300 a2=0 a3=7ffd28cc12ec items=0 ppid=2147 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.832000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:42:44.840047 env[1189]: time="2025-10-29T04:42:44.839904655Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:42:44.840258 env[1189]: time="2025-10-29T04:42:44.840013693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:42:44.840430 env[1189]: time="2025-10-29T04:42:44.840244925Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:42:44.841121 env[1189]: time="2025-10-29T04:42:44.841039093Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05 pid=2677 runtime=io.containerd.runc.v2 Oct 29 04:42:44.877538 systemd[1]: Started cri-containerd-e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05.scope. Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.902000 audit: BPF prog-id=115 op=LOAD Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2677 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343462303934303762633164346539643162386530663132663532 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2677 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343462303934303762633164346539643162386530663132663532 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit: BPF prog-id=116 op=LOAD Oct 29 04:42:44.903000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028b440 items=0 ppid=2677 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343462303934303762633164346539643162386530663132663532 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit: BPF prog-id=117 op=LOAD Oct 29 04:42:44.903000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028b488 items=0 ppid=2677 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343462303934303762633164346539643162386530663132663532 Oct 29 04:42:44.903000 audit: BPF prog-id=117 op=UNLOAD Oct 29 04:42:44.903000 audit: BPF prog-id=116 op=UNLOAD Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:44.903000 audit: BPF prog-id=118 op=LOAD Oct 29 04:42:44.903000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028b898 items=0 ppid=2677 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343462303934303762633164346539643162386530663132663532 Oct 29 04:42:44.949732 env[1189]: time="2025-10-29T04:42:44.949595206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0d7e4f64-55fe-42cc-9b1d-7a8b8fdba967,Namespace:default,Attempt:0,} returns sandbox id \"e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05\"" Oct 29 04:42:44.953768 env[1189]: time="2025-10-29T04:42:44.953725411Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 29 04:42:45.082529 kubelet[1475]: E1029 04:42:45.082424 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:45.366696 systemd[1]: run-containerd-runc-k8s.io-e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05-runc.eeFvm7.mount: Deactivated successfully. Oct 29 04:42:46.083617 kubelet[1475]: E1029 04:42:46.083520 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:46.475147 systemd-networkd[1020]: cali60e51b789ff: Gained IPv6LL Oct 29 04:42:47.087283 kubelet[1475]: E1029 04:42:47.084102 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:48.084646 kubelet[1475]: E1029 04:42:48.084553 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:49.085096 kubelet[1475]: E1029 04:42:49.085028 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:49.769280 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2190738760.mount: Deactivated successfully. Oct 29 04:42:50.086044 kubelet[1475]: E1029 04:42:50.085965 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:51.086615 kubelet[1475]: E1029 04:42:51.086524 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:52.086903 kubelet[1475]: E1029 04:42:52.086834 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:53.087789 kubelet[1475]: E1029 04:42:53.087680 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:53.536521 env[1189]: time="2025-10-29T04:42:53.536280118Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:53.539465 env[1189]: time="2025-10-29T04:42:53.539413671Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:53.541940 env[1189]: time="2025-10-29T04:42:53.541905726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:53.545010 env[1189]: time="2025-10-29T04:42:53.544943207Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:42:53.546480 env[1189]: time="2025-10-29T04:42:53.546405106Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Oct 29 04:42:53.550322 env[1189]: time="2025-10-29T04:42:53.550284687Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 04:42:53.552341 env[1189]: time="2025-10-29T04:42:53.552271953Z" level=info msg="CreateContainer within sandbox \"e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 29 04:42:53.568297 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2348416368.mount: Deactivated successfully. Oct 29 04:42:53.578666 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount794996152.mount: Deactivated successfully. Oct 29 04:42:53.587437 env[1189]: time="2025-10-29T04:42:53.587383808Z" level=info msg="CreateContainer within sandbox \"e644b09407bc1d4e9d1b8e0f12f527ebbf0934cf0e58b55167b1d0e2fc26bd05\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c2102810c72e043a34cf611c6750e233ad76c69db241171be533344d9a8823ed\"" Oct 29 04:42:53.589434 env[1189]: time="2025-10-29T04:42:53.589357390Z" level=info msg="StartContainer for \"c2102810c72e043a34cf611c6750e233ad76c69db241171be533344d9a8823ed\"" Oct 29 04:42:53.629828 systemd[1]: Started cri-containerd-c2102810c72e043a34cf611c6750e233ad76c69db241171be533344d9a8823ed.scope. Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681986 kernel: kauditd_printk_skb: 62 callbacks suppressed Oct 29 04:42:53.682151 kernel: audit: type=1400 audit(1761712973.669:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.691582 kernel: audit: type=1400 audit(1761712973.669:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.691674 kernel: audit: type=1400 audit(1761712973.669:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.691754 kernel: audit: type=1400 audit(1761712973.669:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.701029 kernel: audit: type=1400 audit(1761712973.669:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.701115 kernel: audit: type=1400 audit(1761712973.669:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.710910 kernel: audit: type=1400 audit(1761712973.669:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.710989 kernel: audit: type=1400 audit(1761712973.669:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.720720 kernel: audit: type=1400 audit(1761712973.669:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.724712 kernel: audit: type=1400 audit(1761712973.681:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit: BPF prog-id=119 op=LOAD Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2677 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:53.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313032383130633732653034336133346366363131633637353065 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2677 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:53.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313032383130633732653034336133346366363131633637353065 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.681000 audit: BPF prog-id=120 op=LOAD Oct 29 04:42:53.681000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ba1d0 items=0 ppid=2677 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:53.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313032383130633732653034336133346366363131633637353065 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.696000 audit: BPF prog-id=121 op=LOAD Oct 29 04:42:53.696000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ba218 items=0 ppid=2677 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:53.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313032383130633732653034336133346366363131633637353065 Oct 29 04:42:53.705000 audit: BPF prog-id=121 op=UNLOAD Oct 29 04:42:53.705000 audit: BPF prog-id=120 op=UNLOAD Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:42:53.705000 audit: BPF prog-id=122 op=LOAD Oct 29 04:42:53.705000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ba628 items=0 ppid=2677 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313032383130633732653034336133346366363131633637353065 Oct 29 04:42:53.752738 env[1189]: time="2025-10-29T04:42:53.752578278Z" level=info msg="StartContainer for \"c2102810c72e043a34cf611c6750e233ad76c69db241171be533344d9a8823ed\" returns successfully" Oct 29 04:42:53.817000 audit[2758]: AVC avc: denied { search } for pid=2758 comm="rpcbind" name="crypto" dev="proc" ino=24909 scontext=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 04:42:53.817000 audit[2758]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa5e47900c0 a2=0 a3=0 items=0 ppid=2741 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 key=(null) Oct 29 04:42:53.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 29 04:42:53.866000 audit[2763]: AVC avc: denied { search } for pid=2763 comm="dbus-daemon" name="crypto" dev="proc" ino=24909 scontext=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 04:42:53.866000 audit[2763]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe6a76a20c0 a2=0 a3=0 items=0 ppid=2741 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 key=(null) Oct 29 04:42:53.866000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 29 04:42:53.872000 audit[2764]: AVC avc: denied { watch } for pid=2764 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537419 scontext=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c603,c895 tclass=dir permissive=0 Oct 29 04:42:53.872000 audit[2764]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=559e782008c0 a2=2c8 a3=7ffeca4ac90c items=0 ppid=2741 pid=2764 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 key=(null) Oct 29 04:42:53.872000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 29 04:42:53.875255 env[1189]: time="2025-10-29T04:42:53.875194790Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:53.876315 env[1189]: time="2025-10-29T04:42:53.876243897Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 04:42:53.876846 kubelet[1475]: E1029 04:42:53.876639 1475 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:53.876957 kubelet[1475]: E1029 04:42:53.876836 1475 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:53.877309 kubelet[1475]: E1029 04:42:53.877214 1475 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65fdj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-55g6q_calico-system(c039d16b-2bfe-46ec-aef3-ee4416970de2): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:53.879893 env[1189]: time="2025-10-29T04:42:53.879852004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 04:42:53.879000 audit[2765]: AVC avc: denied { read } for pid=2765 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24114 scontext=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 29 04:42:53.879000 audit[2765]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f3263d6c320 a1=80000 a2=d a3=7ffe707846e0 items=0 ppid=2741 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 key=(null) Oct 29 04:42:53.879000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 29 04:42:53.881000 audit[2765]: AVC avc: denied { search } for pid=2765 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24909 scontext=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 04:42:53.881000 audit[2765]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f32632c00c0 a2=0 a3=0 items=0 ppid=2741 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c603,c895 key=(null) Oct 29 04:42:53.881000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 29 04:42:54.088340 kubelet[1475]: E1029 04:42:54.088146 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:54.194120 env[1189]: time="2025-10-29T04:42:54.194034719Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:54.195266 env[1189]: time="2025-10-29T04:42:54.195171567Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 04:42:54.195703 kubelet[1475]: E1029 04:42:54.195576 1475 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:54.195824 kubelet[1475]: E1029 04:42:54.195740 1475 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:54.196785 kubelet[1475]: E1029 04:42:54.196643 1475 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65fdj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-55g6q_calico-system(c039d16b-2bfe-46ec-aef3-ee4416970de2): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:54.198278 kubelet[1475]: E1029 04:42:54.198173 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:42:54.619000 audit[2784]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:54.619000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc9bee8690 a2=0 a3=7ffc9bee867c items=0 ppid=1730 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:54.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:54.632000 audit[2784]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:54.632000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc9bee8690 a2=0 a3=7ffc9bee867c items=0 ppid=1730 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:54.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:55.090036 kubelet[1475]: E1029 04:42:55.089975 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:56.091822 kubelet[1475]: E1029 04:42:56.091762 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:57.014882 kubelet[1475]: E1029 04:42:57.014811 1475 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:57.080437 env[1189]: time="2025-10-29T04:42:57.080361914Z" level=info msg="StopPodSandbox for \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\"" Oct 29 04:42:57.093036 kubelet[1475]: E1029 04:42:57.092991 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.163 [WARNING][2795] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-csi--node--driver--55g6q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c039d16b-2bfe-46ec-aef3-ee4416970de2", ResourceVersion:"1511", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 41, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433", Pod:"csi-node-driver-55g6q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.92.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali557560cf9bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.164 [INFO][2795] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.164 [INFO][2795] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" iface="eth0" netns="" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.164 [INFO][2795] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.164 [INFO][2795] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.221 [INFO][2803] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.221 [INFO][2803] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.221 [INFO][2803] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.233 [WARNING][2803] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.233 [INFO][2803] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.236 [INFO][2803] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:57.240912 env[1189]: 2025-10-29 04:42:57.238 [INFO][2795] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.240912 env[1189]: time="2025-10-29T04:42:57.240581922Z" level=info msg="TearDown network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\" successfully" Oct 29 04:42:57.240912 env[1189]: time="2025-10-29T04:42:57.240642272Z" level=info msg="StopPodSandbox for \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\" returns successfully" Oct 29 04:42:57.243161 env[1189]: time="2025-10-29T04:42:57.243075351Z" level=info msg="RemovePodSandbox for \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\"" Oct 29 04:42:57.243272 env[1189]: time="2025-10-29T04:42:57.243142520Z" level=info msg="Forcibly stopping sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\"" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.310 [WARNING][2818] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-csi--node--driver--55g6q-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c039d16b-2bfe-46ec-aef3-ee4416970de2", ResourceVersion:"1511", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 41, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"2eb4f53a9ceab125a08aa8a6d0f5431bfca8463a1454c95728fb78dcd67bb433", Pod:"csi-node-driver-55g6q", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.92.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali557560cf9bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.310 [INFO][2818] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.310 [INFO][2818] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" iface="eth0" netns="" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.310 [INFO][2818] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.310 [INFO][2818] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.370 [INFO][2827] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.370 [INFO][2827] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.370 [INFO][2827] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.380 [WARNING][2827] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.380 [INFO][2827] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" HandleID="k8s-pod-network.cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Workload="10.243.77.174-k8s-csi--node--driver--55g6q-eth0" Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.382 [INFO][2827] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:57.386361 env[1189]: 2025-10-29 04:42:57.384 [INFO][2818] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8" Oct 29 04:42:57.387989 env[1189]: time="2025-10-29T04:42:57.387927573Z" level=info msg="TearDown network for sandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\" successfully" Oct 29 04:42:57.392021 env[1189]: time="2025-10-29T04:42:57.391985245Z" level=info msg="RemovePodSandbox \"cd860fdf172c5f70005773fcb637a33cb457a5191711bc40b293058d10ba7cb8\" returns successfully" Oct 29 04:42:57.393093 env[1189]: time="2025-10-29T04:42:57.393053947Z" level=info msg="StopPodSandbox for \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\"" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.456 [WARNING][2842] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e54682e7-b522-4269-b179-f10a75e2e655", ResourceVersion:"1438", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98", Pod:"nginx-deployment-7fcdb87857-xmwqn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali69b38d442bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.457 [INFO][2842] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.457 [INFO][2842] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" iface="eth0" netns="" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.457 [INFO][2842] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.457 [INFO][2842] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.512 [INFO][2859] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.512 [INFO][2859] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.512 [INFO][2859] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.524 [WARNING][2859] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.524 [INFO][2859] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.526 [INFO][2859] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:57.530332 env[1189]: 2025-10-29 04:42:57.528 [INFO][2842] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.531555 env[1189]: time="2025-10-29T04:42:57.531461528Z" level=info msg="TearDown network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\" successfully" Oct 29 04:42:57.531714 env[1189]: time="2025-10-29T04:42:57.531654481Z" level=info msg="StopPodSandbox for \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\" returns successfully" Oct 29 04:42:57.532299 env[1189]: time="2025-10-29T04:42:57.532242401Z" level=info msg="RemovePodSandbox for \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\"" Oct 29 04:42:57.532431 env[1189]: time="2025-10-29T04:42:57.532353813Z" level=info msg="Forcibly stopping sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\"" Oct 29 04:42:57.646662 kubelet[1475]: I1029 04:42:57.646298 1475 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=5.049681986 podStartE2EDuration="13.646244096s" podCreationTimestamp="2025-10-29 04:42:44 +0000 UTC" firstStartedPulling="2025-10-29 04:42:44.95253207 +0000 UTC m=+48.841014740" lastFinishedPulling="2025-10-29 04:42:53.549094184 +0000 UTC m=+57.437576850" observedRunningTime="2025-10-29 04:42:54.569412047 +0000 UTC m=+58.457894714" watchObservedRunningTime="2025-10-29 04:42:57.646244096 +0000 UTC m=+61.534726762" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.603 [WARNING][2887] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e54682e7-b522-4269-b179-f10a75e2e655", ResourceVersion:"1438", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"981426485f55107d18be9a6e32353c46ab3e62ff8ef4fa15cd9245e5a233ee98", Pod:"nginx-deployment-7fcdb87857-xmwqn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali69b38d442bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.604 [INFO][2887] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.604 [INFO][2887] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" iface="eth0" netns="" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.604 [INFO][2887] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.604 [INFO][2887] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.642 [INFO][2894] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.642 [INFO][2894] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.643 [INFO][2894] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.664 [WARNING][2894] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.664 [INFO][2894] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" HandleID="k8s-pod-network.4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Workload="10.243.77.174-k8s-nginx--deployment--7fcdb87857--xmwqn-eth0" Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.667 [INFO][2894] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:57.670332 env[1189]: 2025-10-29 04:42:57.668 [INFO][2887] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a" Oct 29 04:42:57.671578 env[1189]: time="2025-10-29T04:42:57.671515525Z" level=info msg="TearDown network for sandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\" successfully" Oct 29 04:42:57.674637 env[1189]: time="2025-10-29T04:42:57.674598580Z" level=info msg="RemovePodSandbox \"4daac27fb776df3a80afd5a5ccec038f6911d3564bb7e8498d7a9f5bedd4936a\" returns successfully" Oct 29 04:42:58.093578 kubelet[1475]: E1029 04:42:58.093504 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:42:59.094360 kubelet[1475]: E1029 04:42:59.094265 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:00.094916 kubelet[1475]: E1029 04:43:00.094792 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:01.095137 kubelet[1475]: E1029 04:43:01.095053 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:02.096156 kubelet[1475]: E1029 04:43:02.096101 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:03.097878 kubelet[1475]: E1029 04:43:03.097804 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:03.776081 systemd[1]: Created slice kubepods-besteffort-pod452963b8_0b19_4ff1_8f08_67ba866ac021.slice. Oct 29 04:43:03.779049 kubelet[1475]: I1029 04:43:03.778994 1475 status_manager.go:890] "Failed to get status for pod" podUID="452963b8-0b19-4ff1-8f08-67ba866ac021" pod="default/test-pod-1" err="pods \"test-pod-1\" is forbidden: User \"system:node:10.243.77.174\" cannot get resource \"pods\" in API group \"\" in the namespace \"default\": no relationship found between node '10.243.77.174' and this object" Oct 29 04:43:03.975239 kubelet[1475]: I1029 04:43:03.974855 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-ac43d80a-c411-4129-8de4-23436ce87a94\" (UniqueName: \"kubernetes.io/nfs/452963b8-0b19-4ff1-8f08-67ba866ac021-pvc-ac43d80a-c411-4129-8de4-23436ce87a94\") pod \"test-pod-1\" (UID: \"452963b8-0b19-4ff1-8f08-67ba866ac021\") " pod="default/test-pod-1" Oct 29 04:43:03.975663 kubelet[1475]: I1029 04:43:03.975625 1475 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c8gvw\" (UniqueName: \"kubernetes.io/projected/452963b8-0b19-4ff1-8f08-67ba866ac021-kube-api-access-c8gvw\") pod \"test-pod-1\" (UID: \"452963b8-0b19-4ff1-8f08-67ba866ac021\") " pod="default/test-pod-1" Oct 29 04:43:04.098349 kubelet[1475]: E1029 04:43:04.098297 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:04.111000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.126999 kernel: Failed to create system directory netfs Oct 29 04:43:04.127142 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 29 04:43:04.127202 kernel: audit: type=1400 audit(1761712984.111:788): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.127278 kernel: Failed to create system directory netfs Oct 29 04:43:04.127337 kernel: audit: type=1400 audit(1761712984.111:788): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.111000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.133790 kernel: Failed to create system directory netfs Oct 29 04:43:04.133865 kernel: audit: type=1400 audit(1761712984.111:788): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.111000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.140678 kernel: Failed to create system directory netfs Oct 29 04:43:04.140789 kernel: audit: type=1400 audit(1761712984.111:788): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.111000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.111000 audit[2905]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e7cfaa65e0 a1=153bc a2=55e7ce5862b0 a3=5 items=0 ppid=74 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:04.111000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 04:43:04.164440 kernel: audit: type=1300 audit(1761712984.111:788): arch=c000003e syscall=175 success=yes exit=0 a0=55e7cfaa65e0 a1=153bc a2=55e7ce5862b0 a3=5 items=0 ppid=74 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:04.164559 kernel: audit: type=1327 audit(1761712984.111:788): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 04:43:04.180291 kernel: Failed to create system directory fscache Oct 29 04:43:04.180415 kernel: audit: type=1400 audit(1761712984.169:789): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.180478 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.186902 kernel: audit: type=1400 audit(1761712984.169:789): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.186980 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.193579 kernel: audit: type=1400 audit(1761712984.169:789): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.193663 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.200499 kernel: audit: type=1400 audit(1761712984.169:789): avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.200580 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.203410 kernel: Failed to create system directory fscache Oct 29 04:43:04.203491 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.206206 kernel: Failed to create system directory fscache Oct 29 04:43:04.206282 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.207647 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.210382 kernel: Failed to create system directory fscache Oct 29 04:43:04.210644 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.213256 kernel: Failed to create system directory fscache Oct 29 04:43:04.213335 kernel: Failed to create system directory fscache Oct 29 04:43:04.169000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.217749 kernel: FS-Cache: Loaded Oct 29 04:43:04.169000 audit[2905]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e7cfcbb9c0 a1=4c0fc a2=55e7ce5862b0 a3=5 items=0 ppid=74 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:04.169000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.264951 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.265047 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.265113 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.267854 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.267937 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.270676 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.270760 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.273503 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.273570 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.276315 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.276395 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.277771 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.280426 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.280501 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.284524 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.284598 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.284651 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.287244 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.287331 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.288525 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.289937 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.291335 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.292755 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.295452 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.295574 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.298366 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.298552 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.301069 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.301137 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.302377 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.303788 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.305159 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.306494 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.307780 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.309215 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.311915 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.311968 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.313323 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.316098 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.316191 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.317441 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.318775 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.321382 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.321467 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.322763 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.325382 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.325482 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.326701 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.328123 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.344123 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.344248 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.345358 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.346803 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.348070 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.349417 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.352948 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.353040 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.353300 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.354632 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.357330 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.357424 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.358676 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.361372 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.361483 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.362777 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.365408 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.365539 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.366715 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.367975 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.369352 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.370626 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.371951 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.373371 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.374763 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.375990 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.377374 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.378750 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.381389 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.381484 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.384023 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.384116 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.385228 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.386655 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.389324 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.389454 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.391987 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.392110 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.393380 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.394649 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.396010 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.397395 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.400016 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.400101 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.401330 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.404006 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.404172 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.405278 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.406670 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.409286 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.409425 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.411893 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.411992 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.413214 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.414611 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.415879 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.417368 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.418733 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.421436 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.421538 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.422844 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.424220 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.427070 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.427201 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.428477 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.431273 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.431392 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.432635 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.435373 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.435483 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.436694 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.438116 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.439421 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.440831 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.443473 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.443542 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.444732 kernel: Failed to create system directory sunrpc Oct 29 04:43:04.244000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.458698 kernel: RPC: Registered named UNIX socket transport module. Oct 29 04:43:04.458821 kernel: RPC: Registered udp transport module. Oct 29 04:43:04.459049 kernel: RPC: Registered tcp transport module. Oct 29 04:43:04.465495 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 29 04:43:04.244000 audit[2905]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e7cfd07ad0 a1=1a8274 a2=55e7ce5862b0 a3=5 items=6 ppid=74 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:04.244000 audit: CWD cwd="/" Oct 29 04:43:04.244000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:43:04.244000 audit: PATH item=1 name=(null) inode=25116 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:43:04.244000 audit: PATH item=2 name=(null) inode=25116 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:43:04.244000 audit: PATH item=3 name=(null) inode=25117 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:43:04.244000 audit: PATH item=4 name=(null) inode=25116 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:43:04.244000 audit: PATH item=5 name=(null) inode=25118 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:43:04.244000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.518809 kernel: Failed to create system directory nfs Oct 29 04:43:04.518919 kernel: Failed to create system directory nfs Oct 29 04:43:04.518991 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.519924 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.521392 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.524096 kernel: Failed to create system directory nfs Oct 29 04:43:04.524230 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.525300 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.526693 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.529338 kernel: Failed to create system directory nfs Oct 29 04:43:04.529447 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.532041 kernel: Failed to create system directory nfs Oct 29 04:43:04.532151 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.533255 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.534624 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.535757 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.537079 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.538361 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.541483 kernel: Failed to create system directory nfs Oct 29 04:43:04.541777 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.543453 kernel: Failed to create system directory nfs Oct 29 04:43:04.543534 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.544633 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.545965 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.547182 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.548461 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.549702 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.550909 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.552243 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.553494 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.554796 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.556050 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.558611 kernel: Failed to create system directory nfs Oct 29 04:43:04.558769 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.559754 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.561149 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.562279 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.563618 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.564948 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.566137 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.567483 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.568720 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.569946 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.572460 kernel: Failed to create system directory nfs Oct 29 04:43:04.572556 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.573766 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.574924 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.576242 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.577513 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.580121 kernel: Failed to create system directory nfs Oct 29 04:43:04.580222 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.581383 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.582637 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.585176 kernel: Failed to create system directory nfs Oct 29 04:43:04.585299 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.586433 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.587618 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.588986 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.590167 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.591450 kernel: Failed to create system directory nfs Oct 29 04:43:04.502000 audit[2905]: AVC avc: denied { confidentiality } for pid=2905 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.618862 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 29 04:43:04.502000 audit[2905]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e7cff28c10 a1=16eb2c a2=55e7ce5862b0 a3=5 items=0 ppid=74 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:04.502000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.676397 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.676503 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.679414 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.679471 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.680924 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.682361 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.683807 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.685259 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.686702 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.689516 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.689567 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.692411 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.692462 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.693907 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.695334 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.696796 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.698266 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.699815 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.701300 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.702778 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.704218 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.705650 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.708629 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.708716 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.711544 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.711606 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.714430 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.714513 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.716000 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.717582 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.720429 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.720489 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.721915 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.723387 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.724815 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.726313 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.727740 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.729190 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.743933 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.745474 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.748442 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.748496 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.750014 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.751484 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.752956 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.754453 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.756060 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.757632 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.760715 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.760824 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.760907 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.763416 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.763498 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.766029 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.766120 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.767365 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.768739 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.771405 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.771486 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.773970 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.774100 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.775272 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.776544 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.779139 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.779232 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.780372 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.788819 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.789034 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.790140 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.792751 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.792857 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.795430 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.795567 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.796743 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.798132 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.799402 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.801975 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.802106 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.803272 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.804521 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.807201 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.807282 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.808487 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.809769 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.812361 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.812443 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.815004 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.815098 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.817644 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.817754 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.820306 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.820376 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.822835 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.822984 kernel: Failed to create system directory nfs4 Oct 29 04:43:04.654000 audit[2910]: AVC avc: denied { confidentiality } for pid=2910 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:04.999760 kernel: NFS: Registering the id_resolver key type Oct 29 04:43:05.000005 kernel: Key type id_resolver registered Oct 29 04:43:05.000056 kernel: Key type id_legacy registered Oct 29 04:43:04.654000 audit[2910]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f10093bc010 a1=2095c4 a2=55c0ea0822b0 a3=5 items=0 ppid=74 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:04.654000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.022764 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.022946 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.022992 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.024000 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.025215 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.026577 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.027822 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.029214 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.030564 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.033234 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.033370 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.034573 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.035794 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.037250 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.038562 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.039941 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.041190 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.042615 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.044015 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.047038 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.047151 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.048488 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.049745 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.051125 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.052458 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.053787 kernel: Failed to create system directory rpcgss Oct 29 04:43:05.014000 audit[2913]: AVC avc: denied { confidentiality } for pid=2913 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:43:05.014000 audit[2913]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd9a81c4010 a1=70bf4 a2=56543ff932b0 a3=5 items=0 ppid=74 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.014000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 29 04:43:05.094248 nfsidmap[2921]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Oct 29 04:43:05.099585 kubelet[1475]: E1029 04:43:05.099435 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:05.103174 nfsidmap[2924]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Oct 29 04:43:05.120000 audit[1275]: AVC avc: denied { watch_reads } for pid=1275 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2569 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 04:43:05.120000 audit[1275]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d96c6da030 a2=10 a3=c2ef1bb2a8ff0ccf items=0 ppid=1 pid=1275 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.120000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 04:43:05.120000 audit[1275]: AVC avc: denied { watch_reads } for pid=1275 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2569 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 04:43:05.120000 audit[1275]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d96c6da030 a2=10 a3=c2ef1bb2a8ff0ccf items=0 ppid=1 pid=1275 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.120000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 04:43:05.120000 audit[1275]: AVC avc: denied { watch_reads } for pid=1275 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2569 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 04:43:05.120000 audit[1275]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d96c6da030 a2=10 a3=c2ef1bb2a8ff0ccf items=0 ppid=1 pid=1275 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.120000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 04:43:05.120000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2569 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 04:43:05.120000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2569 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 04:43:05.120000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2569 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 04:43:05.281385 env[1189]: time="2025-10-29T04:43:05.281171034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:452963b8-0b19-4ff1-8f08-67ba866ac021,Namespace:default,Attempt:0,}" Oct 29 04:43:05.563339 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 04:43:05.563557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 29 04:43:05.561994 systemd-networkd[1020]: cali5ec59c6bf6e: Link UP Oct 29 04:43:05.567433 systemd-networkd[1020]: cali5ec59c6bf6e: Gained carrier Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.362 [INFO][2927] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.243.77.174-k8s-test--pod--1-eth0 default 452963b8-0b19-4ff1-8f08-67ba866ac021 1580 0 2025-10-29 04:42:46 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.243.77.174 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.362 [INFO][2927] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-eth0" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.407 [INFO][2940] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" HandleID="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Workload="10.243.77.174-k8s-test--pod--1-eth0" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.407 [INFO][2940] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" HandleID="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Workload="10.243.77.174-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"default", "node":"10.243.77.174", "pod":"test-pod-1", "timestamp":"2025-10-29 04:43:05.406978981 +0000 UTC"}, Hostname:"10.243.77.174", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.407 [INFO][2940] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.407 [INFO][2940] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.407 [INFO][2940] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.243.77.174' Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.434 [INFO][2940] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.458 [INFO][2940] ipam/ipam.go 394: Looking up existing affinities for host host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.477 [INFO][2940] ipam/ipam.go 511: Trying affinity for 192.168.92.64/26 host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.493 [INFO][2940] ipam/ipam.go 158: Attempting to load block cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.497 [INFO][2940] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.92.64/26 host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.497 [INFO][2940] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.92.64/26 handle="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.503 [INFO][2940] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109 Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.510 [INFO][2940] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.92.64/26 handle="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.545 [INFO][2940] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.92.68/26] block=192.168.92.64/26 handle="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.545 [INFO][2940] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.92.68/26] handle="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" host="10.243.77.174" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.545 [INFO][2940] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.545 [INFO][2940] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.92.68/26] IPv6=[] ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" HandleID="k8s-pod-network.3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Workload="10.243.77.174-k8s-test--pod--1-eth0" Oct 29 04:43:05.581745 env[1189]: 2025-10-29 04:43:05.547 [INFO][2927] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"452963b8-0b19-4ff1-8f08-67ba866ac021", ResourceVersion:"1580", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:43:05.583356 env[1189]: 2025-10-29 04:43:05.548 [INFO][2927] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.92.68/32] ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-eth0" Oct 29 04:43:05.583356 env[1189]: 2025-10-29 04:43:05.548 [INFO][2927] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-eth0" Oct 29 04:43:05.583356 env[1189]: 2025-10-29 04:43:05.568 [INFO][2927] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-eth0" Oct 29 04:43:05.583356 env[1189]: 2025-10-29 04:43:05.569 [INFO][2927] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.243.77.174-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"452963b8-0b19-4ff1-8f08-67ba866ac021", ResourceVersion:"1580", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 42, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.243.77.174", ContainerID:"3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0a:4b:68:c0:62:eb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:43:05.583356 env[1189]: 2025-10-29 04:43:05.579 [INFO][2927] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.243.77.174-k8s-test--pod--1-eth0" Oct 29 04:43:05.607000 audit[2959]: NETFILTER_CFG table=filter:78 family=2 entries=42 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:43:05.607000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=21984 a0=3 a1=7fffe8a7e4c0 a2=0 a3=7fffe8a7e4ac items=0 ppid=2147 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.607000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:43:05.610146 env[1189]: time="2025-10-29T04:43:05.609998971Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:43:05.610273 env[1189]: time="2025-10-29T04:43:05.610186583Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:43:05.610330 env[1189]: time="2025-10-29T04:43:05.610257551Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:43:05.610679 env[1189]: time="2025-10-29T04:43:05.610601945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109 pid=2962 runtime=io.containerd.runc.v2 Oct 29 04:43:05.637993 systemd[1]: Started cri-containerd-3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109.scope. Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.678000 audit: BPF prog-id=123 op=LOAD Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2962 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364623461633233636333386463646364323963393663366361366462 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2962 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364623461633233636333386463646364323963393663366361366462 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit: BPF prog-id=124 op=LOAD Oct 29 04:43:05.679000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025a20 items=0 ppid=2962 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364623461633233636333386463646364323963393663366361366462 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.679000 audit: BPF prog-id=125 op=LOAD Oct 29 04:43:05.679000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025a68 items=0 ppid=2962 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364623461633233636333386463646364323963393663366361366462 Oct 29 04:43:05.680000 audit: BPF prog-id=125 op=UNLOAD Oct 29 04:43:05.680000 audit: BPF prog-id=124 op=UNLOAD Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { perfmon } for pid=2972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit[2972]: AVC avc: denied { bpf } for pid=2972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:05.680000 audit: BPF prog-id=126 op=LOAD Oct 29 04:43:05.680000 audit[2972]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025e78 items=0 ppid=2962 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:05.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364623461633233636333386463646364323963393663366361366462 Oct 29 04:43:05.729326 env[1189]: time="2025-10-29T04:43:05.729263131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:452963b8-0b19-4ff1-8f08-67ba866ac021,Namespace:default,Attempt:0,} returns sandbox id \"3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109\"" Oct 29 04:43:05.731911 env[1189]: time="2025-10-29T04:43:05.731862795Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 29 04:43:06.098371 env[1189]: time="2025-10-29T04:43:06.098306110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:43:06.100590 kubelet[1475]: E1029 04:43:06.100542 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:06.102174 env[1189]: time="2025-10-29T04:43:06.102135471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:43:06.108776 env[1189]: time="2025-10-29T04:43:06.108719314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:43:06.116023 env[1189]: time="2025-10-29T04:43:06.115951157Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:43:06.117013 env[1189]: time="2025-10-29T04:43:06.116973432Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 29 04:43:06.121557 env[1189]: time="2025-10-29T04:43:06.121518496Z" level=info msg="CreateContainer within sandbox \"3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 29 04:43:06.136266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3440546340.mount: Deactivated successfully. Oct 29 04:43:06.146359 env[1189]: time="2025-10-29T04:43:06.146286205Z" level=info msg="CreateContainer within sandbox \"3db4ac23cc38dcdcd29c96c6ca6db0c3567393974887e7d6bbf1e4dca08b1109\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"93e0b44d6a43abdcf60141defa7bc64a8510fa546f678fd9ea077c5aeccc4401\"" Oct 29 04:43:06.147073 env[1189]: time="2025-10-29T04:43:06.147040718Z" level=info msg="StartContainer for \"93e0b44d6a43abdcf60141defa7bc64a8510fa546f678fd9ea077c5aeccc4401\"" Oct 29 04:43:06.174637 systemd[1]: Started cri-containerd-93e0b44d6a43abdcf60141defa7bc64a8510fa546f678fd9ea077c5aeccc4401.scope. Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.196000 audit: BPF prog-id=127 op=LOAD Oct 29 04:43:06.198000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.198000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2962 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:06.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933653062343464366134336162646366363031343164656661376263 Oct 29 04:43:06.198000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.198000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2962 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:06.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933653062343464366134336162646366363031343164656661376263 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.199000 audit: BPF prog-id=128 op=LOAD Oct 29 04:43:06.199000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e4c00 items=0 ppid=2962 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:06.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933653062343464366134336162646366363031343164656661376263 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.200000 audit: BPF prog-id=129 op=LOAD Oct 29 04:43:06.200000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e4c48 items=0 ppid=2962 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:06.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933653062343464366134336162646366363031343164656661376263 Oct 29 04:43:06.202000 audit: BPF prog-id=129 op=UNLOAD Oct 29 04:43:06.202000 audit: BPF prog-id=128 op=UNLOAD Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:43:06.202000 audit: BPF prog-id=130 op=LOAD Oct 29 04:43:06.202000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e5058 items=0 ppid=2962 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:06.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933653062343464366134336162646366363031343164656661376263 Oct 29 04:43:06.227373 env[1189]: time="2025-10-29T04:43:06.227308956Z" level=info msg="StartContainer for \"93e0b44d6a43abdcf60141defa7bc64a8510fa546f678fd9ea077c5aeccc4401\" returns successfully" Oct 29 04:43:06.571461 kubelet[1475]: I1029 04:43:06.571355 1475 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=20.182878817 podStartE2EDuration="20.571323862s" podCreationTimestamp="2025-10-29 04:42:46 +0000 UTC" firstStartedPulling="2025-10-29 04:43:05.730758657 +0000 UTC m=+69.619241322" lastFinishedPulling="2025-10-29 04:43:06.119203701 +0000 UTC m=+70.007686367" observedRunningTime="2025-10-29 04:43:06.569722032 +0000 UTC m=+70.458204708" watchObservedRunningTime="2025-10-29 04:43:06.571323862 +0000 UTC m=+70.459806543" Oct 29 04:43:06.953360 systemd-networkd[1020]: cali5ec59c6bf6e: Gained IPv6LL Oct 29 04:43:07.101268 kubelet[1475]: E1029 04:43:07.101175 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:08.101857 kubelet[1475]: E1029 04:43:08.101654 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:08.276570 kubelet[1475]: E1029 04:43:08.276484 1475 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-55g6q" podUID="c039d16b-2bfe-46ec-aef3-ee4416970de2" Oct 29 04:43:09.103899 kubelet[1475]: E1029 04:43:09.103773 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:10.104719 kubelet[1475]: E1029 04:43:10.104615 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:11.105896 kubelet[1475]: E1029 04:43:11.105832 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:12.107440 kubelet[1475]: E1029 04:43:12.107373 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 04:43:13.108947 kubelet[1475]: E1029 04:43:13.108818 1475 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"