Oct 29 01:19:35.683079 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Oct 28 23:40:27 -00 2025 Oct 29 01:19:35.683094 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 01:19:35.683100 kernel: Disabled fast string operations Oct 29 01:19:35.683104 kernel: BIOS-provided physical RAM map: Oct 29 01:19:35.683108 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Oct 29 01:19:35.683111 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Oct 29 01:19:35.683117 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Oct 29 01:19:35.683121 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Oct 29 01:19:35.683125 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Oct 29 01:19:35.683129 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Oct 29 01:19:35.683133 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Oct 29 01:19:35.683137 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Oct 29 01:19:35.683141 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Oct 29 01:19:35.683145 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 29 01:19:35.683151 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Oct 29 01:19:35.683156 kernel: NX (Execute Disable) protection: active Oct 29 01:19:35.683160 kernel: SMBIOS 2.7 present. Oct 29 01:19:35.683165 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Oct 29 01:19:35.683169 kernel: vmware: hypercall mode: 0x00 Oct 29 01:19:35.683174 kernel: Hypervisor detected: VMware Oct 29 01:19:35.683179 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Oct 29 01:19:35.683183 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Oct 29 01:19:35.683188 kernel: vmware: using clock offset of 3621726173 ns Oct 29 01:19:35.683192 kernel: tsc: Detected 3408.000 MHz processor Oct 29 01:19:35.683197 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 29 01:19:35.683202 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 29 01:19:35.683206 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Oct 29 01:19:35.683211 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 29 01:19:35.683215 kernel: total RAM covered: 3072M Oct 29 01:19:35.683221 kernel: Found optimal setting for mtrr clean up Oct 29 01:19:35.683226 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Oct 29 01:19:35.683230 kernel: Using GB pages for direct mapping Oct 29 01:19:35.683235 kernel: ACPI: Early table checksum verification disabled Oct 29 01:19:35.683239 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Oct 29 01:19:35.683253 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Oct 29 01:19:35.683259 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Oct 29 01:19:35.683264 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Oct 29 01:19:35.683268 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 29 01:19:35.683272 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 29 01:19:35.683279 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Oct 29 01:19:35.683285 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Oct 29 01:19:35.683290 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Oct 29 01:19:35.683295 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Oct 29 01:19:35.683300 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Oct 29 01:19:35.683306 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Oct 29 01:19:35.683311 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Oct 29 01:19:35.683316 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Oct 29 01:19:35.683320 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 29 01:19:35.683325 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 29 01:19:35.683330 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Oct 29 01:19:35.683335 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Oct 29 01:19:35.683340 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Oct 29 01:19:35.683345 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Oct 29 01:19:35.683350 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Oct 29 01:19:35.683355 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Oct 29 01:19:35.683360 kernel: system APIC only can use physical flat Oct 29 01:19:35.683365 kernel: Setting APIC routing to physical flat. Oct 29 01:19:35.683369 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 29 01:19:35.683374 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 29 01:19:35.683379 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 29 01:19:35.683384 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 29 01:19:35.683388 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 29 01:19:35.683393 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 29 01:19:35.683399 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 29 01:19:35.683404 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 29 01:19:35.683408 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Oct 29 01:19:35.683413 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Oct 29 01:19:35.683418 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Oct 29 01:19:35.683422 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Oct 29 01:19:35.683427 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Oct 29 01:19:35.683432 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Oct 29 01:19:35.683437 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Oct 29 01:19:35.683488 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Oct 29 01:19:35.683495 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Oct 29 01:19:35.683500 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Oct 29 01:19:35.683504 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Oct 29 01:19:35.683509 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Oct 29 01:19:35.683514 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Oct 29 01:19:35.683519 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Oct 29 01:19:35.683524 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Oct 29 01:19:35.683529 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Oct 29 01:19:35.683534 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Oct 29 01:19:35.683539 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Oct 29 01:19:35.683544 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Oct 29 01:19:35.683549 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Oct 29 01:19:35.683554 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Oct 29 01:19:35.683558 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Oct 29 01:19:35.683563 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Oct 29 01:19:35.683568 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Oct 29 01:19:35.683573 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Oct 29 01:19:35.683578 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Oct 29 01:19:35.683582 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Oct 29 01:19:35.683588 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Oct 29 01:19:35.683593 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Oct 29 01:19:35.683598 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Oct 29 01:19:35.683603 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Oct 29 01:19:35.683608 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Oct 29 01:19:35.683612 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Oct 29 01:19:35.683617 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Oct 29 01:19:35.683622 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Oct 29 01:19:35.683627 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Oct 29 01:19:35.683632 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Oct 29 01:19:35.683638 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Oct 29 01:19:35.683643 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Oct 29 01:19:35.683648 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Oct 29 01:19:35.683652 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Oct 29 01:19:35.683657 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Oct 29 01:19:35.683662 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Oct 29 01:19:35.683667 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Oct 29 01:19:35.683671 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Oct 29 01:19:35.683676 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Oct 29 01:19:35.683681 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Oct 29 01:19:35.683687 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Oct 29 01:19:35.683692 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Oct 29 01:19:35.683697 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Oct 29 01:19:35.683701 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Oct 29 01:19:35.683706 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Oct 29 01:19:35.683711 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Oct 29 01:19:35.683721 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Oct 29 01:19:35.683726 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Oct 29 01:19:35.683731 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Oct 29 01:19:35.683736 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Oct 29 01:19:35.683742 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Oct 29 01:19:35.683748 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Oct 29 01:19:35.683753 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Oct 29 01:19:35.683758 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Oct 29 01:19:35.683763 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Oct 29 01:19:35.683768 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Oct 29 01:19:35.683774 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Oct 29 01:19:35.683779 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Oct 29 01:19:35.683785 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Oct 29 01:19:35.683790 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Oct 29 01:19:35.683795 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Oct 29 01:19:35.683800 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Oct 29 01:19:35.683805 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Oct 29 01:19:35.683810 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Oct 29 01:19:35.683816 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Oct 29 01:19:35.683821 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Oct 29 01:19:35.683826 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Oct 29 01:19:35.683831 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Oct 29 01:19:35.683837 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Oct 29 01:19:35.683842 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Oct 29 01:19:35.683848 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Oct 29 01:19:35.683853 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Oct 29 01:19:35.683858 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Oct 29 01:19:35.683863 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Oct 29 01:19:35.683868 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Oct 29 01:19:35.683874 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Oct 29 01:19:35.683879 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Oct 29 01:19:35.683885 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Oct 29 01:19:35.683891 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Oct 29 01:19:35.683896 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Oct 29 01:19:35.683901 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Oct 29 01:19:35.683906 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Oct 29 01:19:35.683911 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Oct 29 01:19:35.683916 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Oct 29 01:19:35.683922 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Oct 29 01:19:35.683927 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Oct 29 01:19:35.683932 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Oct 29 01:19:35.683938 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Oct 29 01:19:35.683943 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Oct 29 01:19:35.683949 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Oct 29 01:19:35.683954 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Oct 29 01:19:35.683959 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Oct 29 01:19:35.683964 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Oct 29 01:19:35.683969 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Oct 29 01:19:35.683974 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Oct 29 01:19:35.683980 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Oct 29 01:19:35.683985 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Oct 29 01:19:35.683991 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Oct 29 01:19:35.683996 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Oct 29 01:19:35.684001 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Oct 29 01:19:35.684007 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Oct 29 01:19:35.684012 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Oct 29 01:19:35.684017 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Oct 29 01:19:35.684022 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Oct 29 01:19:35.684027 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Oct 29 01:19:35.684032 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Oct 29 01:19:35.684038 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Oct 29 01:19:35.684044 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Oct 29 01:19:35.684049 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Oct 29 01:19:35.684054 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Oct 29 01:19:35.684059 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Oct 29 01:19:35.684064 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Oct 29 01:19:35.684070 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Oct 29 01:19:35.684075 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 29 01:19:35.684080 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 29 01:19:35.684086 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Oct 29 01:19:35.684092 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Oct 29 01:19:35.684097 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Oct 29 01:19:35.684103 kernel: Zone ranges: Oct 29 01:19:35.684108 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 29 01:19:35.684114 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Oct 29 01:19:35.684119 kernel: Normal empty Oct 29 01:19:35.684124 kernel: Movable zone start for each node Oct 29 01:19:35.684129 kernel: Early memory node ranges Oct 29 01:19:35.684135 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Oct 29 01:19:35.684140 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Oct 29 01:19:35.684146 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Oct 29 01:19:35.684151 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Oct 29 01:19:35.684156 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 29 01:19:35.684162 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Oct 29 01:19:35.684167 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Oct 29 01:19:35.684172 kernel: ACPI: PM-Timer IO Port: 0x1008 Oct 29 01:19:35.684177 kernel: system APIC only can use physical flat Oct 29 01:19:35.684182 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Oct 29 01:19:35.684188 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 29 01:19:35.684194 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 29 01:19:35.684199 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 29 01:19:35.684204 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 29 01:19:35.684209 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 29 01:19:35.684214 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 29 01:19:35.684220 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 29 01:19:35.684225 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 29 01:19:35.684230 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 29 01:19:35.684236 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 29 01:19:35.684241 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 29 01:19:35.684247 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 29 01:19:35.684252 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 29 01:19:35.684257 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 29 01:19:35.684262 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 29 01:19:35.684267 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 29 01:19:35.684273 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Oct 29 01:19:35.684278 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Oct 29 01:19:35.684283 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Oct 29 01:19:35.684288 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Oct 29 01:19:35.684294 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Oct 29 01:19:35.684300 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Oct 29 01:19:35.684305 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Oct 29 01:19:35.684310 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Oct 29 01:19:35.684315 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Oct 29 01:19:35.684320 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Oct 29 01:19:35.684326 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Oct 29 01:19:35.684331 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Oct 29 01:19:35.684336 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Oct 29 01:19:35.684342 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Oct 29 01:19:35.684348 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Oct 29 01:19:35.684353 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Oct 29 01:19:35.684358 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Oct 29 01:19:35.684363 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Oct 29 01:19:35.684368 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Oct 29 01:19:35.684374 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Oct 29 01:19:35.684379 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Oct 29 01:19:35.684384 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Oct 29 01:19:35.684389 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Oct 29 01:19:35.684395 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Oct 29 01:19:35.684401 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Oct 29 01:19:35.684406 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Oct 29 01:19:35.684411 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Oct 29 01:19:35.684416 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Oct 29 01:19:35.684422 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Oct 29 01:19:35.684427 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Oct 29 01:19:35.684432 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Oct 29 01:19:35.684437 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Oct 29 01:19:35.684453 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Oct 29 01:19:35.684458 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Oct 29 01:19:35.684464 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Oct 29 01:19:35.684469 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Oct 29 01:19:35.684474 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Oct 29 01:19:35.684479 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Oct 29 01:19:35.684485 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Oct 29 01:19:35.684490 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Oct 29 01:19:35.684495 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Oct 29 01:19:35.684501 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Oct 29 01:19:35.684506 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Oct 29 01:19:35.684512 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Oct 29 01:19:35.684517 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Oct 29 01:19:35.684522 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Oct 29 01:19:35.684527 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Oct 29 01:19:35.684532 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Oct 29 01:19:35.684538 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Oct 29 01:19:35.684543 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Oct 29 01:19:35.684548 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Oct 29 01:19:35.684554 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Oct 29 01:19:35.684559 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Oct 29 01:19:35.684564 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Oct 29 01:19:35.684570 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Oct 29 01:19:35.684575 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Oct 29 01:19:35.684580 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Oct 29 01:19:35.684585 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Oct 29 01:19:35.684591 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Oct 29 01:19:35.684596 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Oct 29 01:19:35.684602 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Oct 29 01:19:35.684607 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Oct 29 01:19:35.684612 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Oct 29 01:19:35.684618 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Oct 29 01:19:35.684623 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Oct 29 01:19:35.684628 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Oct 29 01:19:35.684633 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Oct 29 01:19:35.684639 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Oct 29 01:19:35.684644 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Oct 29 01:19:35.684650 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Oct 29 01:19:35.684655 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Oct 29 01:19:35.684660 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Oct 29 01:19:35.684665 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Oct 29 01:19:35.684671 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Oct 29 01:19:35.684676 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Oct 29 01:19:35.684681 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Oct 29 01:19:35.684687 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Oct 29 01:19:35.684692 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Oct 29 01:19:35.684697 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Oct 29 01:19:35.684703 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Oct 29 01:19:35.684708 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Oct 29 01:19:35.684713 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Oct 29 01:19:35.684718 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Oct 29 01:19:35.684724 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Oct 29 01:19:35.684729 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Oct 29 01:19:35.684734 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Oct 29 01:19:35.684739 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Oct 29 01:19:35.684744 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Oct 29 01:19:35.684750 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Oct 29 01:19:35.684755 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Oct 29 01:19:35.684761 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Oct 29 01:19:35.684766 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Oct 29 01:19:35.684771 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Oct 29 01:19:35.684776 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Oct 29 01:19:35.684781 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Oct 29 01:19:35.684787 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Oct 29 01:19:35.684792 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Oct 29 01:19:35.684797 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Oct 29 01:19:35.684803 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Oct 29 01:19:35.684809 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Oct 29 01:19:35.684814 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Oct 29 01:19:35.684819 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Oct 29 01:19:35.684824 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Oct 29 01:19:35.684830 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Oct 29 01:19:35.684835 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Oct 29 01:19:35.684840 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Oct 29 01:19:35.684845 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Oct 29 01:19:35.684851 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Oct 29 01:19:35.684857 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Oct 29 01:19:35.684862 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Oct 29 01:19:35.684867 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Oct 29 01:19:35.684872 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Oct 29 01:19:35.684878 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Oct 29 01:19:35.684883 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 29 01:19:35.684889 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Oct 29 01:19:35.684894 kernel: TSC deadline timer available Oct 29 01:19:35.684900 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Oct 29 01:19:35.684905 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Oct 29 01:19:35.684910 kernel: Booting paravirtualized kernel on VMware hypervisor Oct 29 01:19:35.684916 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 29 01:19:35.684921 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Oct 29 01:19:35.684927 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 29 01:19:35.684932 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 29 01:19:35.684937 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Oct 29 01:19:35.684943 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Oct 29 01:19:35.684949 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Oct 29 01:19:35.684954 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Oct 29 01:19:35.684959 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Oct 29 01:19:35.684964 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Oct 29 01:19:35.684969 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Oct 29 01:19:35.684982 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Oct 29 01:19:35.684988 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Oct 29 01:19:35.684994 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Oct 29 01:19:35.685000 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Oct 29 01:19:35.685006 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Oct 29 01:19:35.685012 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Oct 29 01:19:35.685017 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Oct 29 01:19:35.685023 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Oct 29 01:19:35.685028 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Oct 29 01:19:35.685034 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Oct 29 01:19:35.685039 kernel: Policy zone: DMA32 Oct 29 01:19:35.685046 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 01:19:35.685053 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 29 01:19:35.685059 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Oct 29 01:19:35.685064 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Oct 29 01:19:35.685070 kernel: printk: log_buf_len min size: 262144 bytes Oct 29 01:19:35.685076 kernel: printk: log_buf_len: 1048576 bytes Oct 29 01:19:35.685081 kernel: printk: early log buf free: 239728(91%) Oct 29 01:19:35.685087 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 29 01:19:35.685092 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 29 01:19:35.685098 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 29 01:19:35.685106 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 155976K reserved, 0K cma-reserved) Oct 29 01:19:35.685111 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Oct 29 01:19:35.685117 kernel: ftrace: allocating 34614 entries in 136 pages Oct 29 01:19:35.685123 kernel: ftrace: allocated 136 pages with 2 groups Oct 29 01:19:35.685129 kernel: rcu: Hierarchical RCU implementation. Oct 29 01:19:35.685136 kernel: rcu: RCU event tracing is enabled. Oct 29 01:19:35.685142 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Oct 29 01:19:35.685148 kernel: Rude variant of Tasks RCU enabled. Oct 29 01:19:35.685154 kernel: Tracing variant of Tasks RCU enabled. Oct 29 01:19:35.685160 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 29 01:19:35.685165 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Oct 29 01:19:35.685171 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Oct 29 01:19:35.685176 kernel: random: crng init done Oct 29 01:19:35.685182 kernel: Console: colour VGA+ 80x25 Oct 29 01:19:35.685188 kernel: printk: console [tty0] enabled Oct 29 01:19:35.685194 kernel: printk: console [ttyS0] enabled Oct 29 01:19:35.685200 kernel: ACPI: Core revision 20210730 Oct 29 01:19:35.685205 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Oct 29 01:19:35.685211 kernel: APIC: Switch to symmetric I/O mode setup Oct 29 01:19:35.685217 kernel: x2apic enabled Oct 29 01:19:35.685222 kernel: Switched APIC routing to physical x2apic. Oct 29 01:19:35.685228 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 29 01:19:35.685234 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 29 01:19:35.685240 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Oct 29 01:19:35.685246 kernel: Disabled fast string operations Oct 29 01:19:35.685252 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 29 01:19:35.685258 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Oct 29 01:19:35.685263 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 29 01:19:35.685269 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 29 01:19:35.685275 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Oct 29 01:19:35.685281 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Oct 29 01:19:35.685286 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Oct 29 01:19:35.685293 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 29 01:19:35.685299 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 29 01:19:35.685305 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 29 01:19:35.685310 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 29 01:19:35.685316 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 29 01:19:35.685322 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 29 01:19:35.685328 kernel: GDS: Unknown: Dependent on hypervisor status Oct 29 01:19:35.685333 kernel: active return thunk: its_return_thunk Oct 29 01:19:35.685339 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 29 01:19:35.685346 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 29 01:19:35.685352 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 29 01:19:35.685357 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 29 01:19:35.685363 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 29 01:19:35.685369 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 29 01:19:35.685374 kernel: Freeing SMP alternatives memory: 32K Oct 29 01:19:35.685380 kernel: pid_max: default: 131072 minimum: 1024 Oct 29 01:19:35.685386 kernel: LSM: Security Framework initializing Oct 29 01:19:35.685391 kernel: SELinux: Initializing. Oct 29 01:19:35.685398 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 01:19:35.685404 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 01:19:35.685410 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 29 01:19:35.685415 kernel: Performance Events: Skylake events, core PMU driver. Oct 29 01:19:35.685421 kernel: core: CPUID marked event: 'cpu cycles' unavailable Oct 29 01:19:35.685427 kernel: core: CPUID marked event: 'instructions' unavailable Oct 29 01:19:35.685433 kernel: core: CPUID marked event: 'bus cycles' unavailable Oct 29 01:19:35.685473 kernel: core: CPUID marked event: 'cache references' unavailable Oct 29 01:19:35.685482 kernel: core: CPUID marked event: 'cache misses' unavailable Oct 29 01:19:35.685490 kernel: core: CPUID marked event: 'branch instructions' unavailable Oct 29 01:19:35.685495 kernel: core: CPUID marked event: 'branch misses' unavailable Oct 29 01:19:35.685501 kernel: ... version: 1 Oct 29 01:19:35.685506 kernel: ... bit width: 48 Oct 29 01:19:35.685512 kernel: ... generic registers: 4 Oct 29 01:19:35.685518 kernel: ... value mask: 0000ffffffffffff Oct 29 01:19:35.685523 kernel: ... max period: 000000007fffffff Oct 29 01:19:35.685529 kernel: ... fixed-purpose events: 0 Oct 29 01:19:35.685534 kernel: ... event mask: 000000000000000f Oct 29 01:19:35.685541 kernel: signal: max sigframe size: 1776 Oct 29 01:19:35.685547 kernel: rcu: Hierarchical SRCU implementation. Oct 29 01:19:35.685553 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 29 01:19:35.685558 kernel: smp: Bringing up secondary CPUs ... Oct 29 01:19:35.685564 kernel: x86: Booting SMP configuration: Oct 29 01:19:35.685570 kernel: .... node #0, CPUs: #1 Oct 29 01:19:35.685575 kernel: Disabled fast string operations Oct 29 01:19:35.685581 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Oct 29 01:19:35.685587 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 29 01:19:35.685592 kernel: smp: Brought up 1 node, 2 CPUs Oct 29 01:19:35.685599 kernel: smpboot: Max logical packages: 128 Oct 29 01:19:35.685604 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Oct 29 01:19:35.685610 kernel: devtmpfs: initialized Oct 29 01:19:35.685616 kernel: x86/mm: Memory block size: 128MB Oct 29 01:19:35.685621 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Oct 29 01:19:35.685627 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 29 01:19:35.685633 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Oct 29 01:19:35.685638 kernel: pinctrl core: initialized pinctrl subsystem Oct 29 01:19:35.685644 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 29 01:19:35.685651 kernel: audit: initializing netlink subsys (disabled) Oct 29 01:19:35.685659 kernel: audit: type=2000 audit(1761700774.097:1): state=initialized audit_enabled=0 res=1 Oct 29 01:19:35.685668 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 29 01:19:35.685675 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 29 01:19:35.685681 kernel: cpuidle: using governor menu Oct 29 01:19:35.685686 kernel: Simple Boot Flag at 0x36 set to 0x80 Oct 29 01:19:35.685694 kernel: ACPI: bus type PCI registered Oct 29 01:19:35.685702 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 29 01:19:35.685710 kernel: dca service started, version 1.12.1 Oct 29 01:19:35.685720 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Oct 29 01:19:35.685728 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Oct 29 01:19:35.685737 kernel: PCI: Using configuration type 1 for base access Oct 29 01:19:35.685746 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 29 01:19:35.685755 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 29 01:19:35.685764 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 29 01:19:35.685772 kernel: ACPI: Added _OSI(Module Device) Oct 29 01:19:35.685780 kernel: ACPI: Added _OSI(Processor Device) Oct 29 01:19:35.685788 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 29 01:19:35.685798 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 29 01:19:35.685807 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 29 01:19:35.685815 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 29 01:19:35.685824 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 29 01:19:35.685833 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Oct 29 01:19:35.685842 kernel: ACPI: Interpreter enabled Oct 29 01:19:35.685851 kernel: ACPI: PM: (supports S0 S1 S5) Oct 29 01:19:35.685859 kernel: ACPI: Using IOAPIC for interrupt routing Oct 29 01:19:35.685868 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 29 01:19:35.685879 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Oct 29 01:19:35.685889 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Oct 29 01:19:35.686007 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 29 01:19:35.686070 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Oct 29 01:19:35.686120 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Oct 29 01:19:35.686137 kernel: PCI host bridge to bus 0000:00 Oct 29 01:19:35.686205 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 29 01:19:35.686272 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Oct 29 01:19:35.686332 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 29 01:19:35.686384 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 29 01:19:35.686457 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Oct 29 01:19:35.699564 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Oct 29 01:19:35.699643 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Oct 29 01:19:35.699706 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Oct 29 01:19:35.699762 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Oct 29 01:19:35.699817 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Oct 29 01:19:35.699866 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Oct 29 01:19:35.699916 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 29 01:19:35.699965 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 29 01:19:35.700028 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 29 01:19:35.700078 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 29 01:19:35.700144 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Oct 29 01:19:35.700195 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Oct 29 01:19:35.700248 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Oct 29 01:19:35.700305 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Oct 29 01:19:35.700355 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Oct 29 01:19:35.700406 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Oct 29 01:19:35.700467 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Oct 29 01:19:35.700517 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Oct 29 01:19:35.700565 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Oct 29 01:19:35.700613 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Oct 29 01:19:35.700661 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Oct 29 01:19:35.700708 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 29 01:19:35.700764 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Oct 29 01:19:35.700817 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.700867 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.700919 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.700973 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701026 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701076 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701129 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701179 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701231 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701279 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701333 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701384 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701437 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701496 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701548 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701598 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701649 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701701 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701754 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701803 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701854 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.701904 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.701956 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702007 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702062 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702136 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702204 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702255 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702310 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702363 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702416 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702476 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702530 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702580 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702633 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702685 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702736 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702785 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702839 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702888 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.702941 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.702993 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.703045 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.703094 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.703149 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.703198 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.703259 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.703315 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.703371 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.703420 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.709361 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.709434 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.709545 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.709598 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.709656 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.709706 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.709773 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.709838 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.709901 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.709964 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.710037 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.710088 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.710140 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Oct 29 01:19:35.710189 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.710242 kernel: pci_bus 0000:01: extended config space not accessible Oct 29 01:19:35.710294 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 29 01:19:35.710348 kernel: pci_bus 0000:02: extended config space not accessible Oct 29 01:19:35.710357 kernel: acpiphp: Slot [32] registered Oct 29 01:19:35.710364 kernel: acpiphp: Slot [33] registered Oct 29 01:19:35.710370 kernel: acpiphp: Slot [34] registered Oct 29 01:19:35.710375 kernel: acpiphp: Slot [35] registered Oct 29 01:19:35.710381 kernel: acpiphp: Slot [36] registered Oct 29 01:19:35.710387 kernel: acpiphp: Slot [37] registered Oct 29 01:19:35.710393 kernel: acpiphp: Slot [38] registered Oct 29 01:19:35.710398 kernel: acpiphp: Slot [39] registered Oct 29 01:19:35.710405 kernel: acpiphp: Slot [40] registered Oct 29 01:19:35.710411 kernel: acpiphp: Slot [41] registered Oct 29 01:19:35.710417 kernel: acpiphp: Slot [42] registered Oct 29 01:19:35.710423 kernel: acpiphp: Slot [43] registered Oct 29 01:19:35.710428 kernel: acpiphp: Slot [44] registered Oct 29 01:19:35.710434 kernel: acpiphp: Slot [45] registered Oct 29 01:19:35.710447 kernel: acpiphp: Slot [46] registered Oct 29 01:19:35.710453 kernel: acpiphp: Slot [47] registered Oct 29 01:19:35.710459 kernel: acpiphp: Slot [48] registered Oct 29 01:19:35.710465 kernel: acpiphp: Slot [49] registered Oct 29 01:19:35.710471 kernel: acpiphp: Slot [50] registered Oct 29 01:19:35.710477 kernel: acpiphp: Slot [51] registered Oct 29 01:19:35.710483 kernel: acpiphp: Slot [52] registered Oct 29 01:19:35.710488 kernel: acpiphp: Slot [53] registered Oct 29 01:19:35.710494 kernel: acpiphp: Slot [54] registered Oct 29 01:19:35.710500 kernel: acpiphp: Slot [55] registered Oct 29 01:19:35.710506 kernel: acpiphp: Slot [56] registered Oct 29 01:19:35.710511 kernel: acpiphp: Slot [57] registered Oct 29 01:19:35.710517 kernel: acpiphp: Slot [58] registered Oct 29 01:19:35.710524 kernel: acpiphp: Slot [59] registered Oct 29 01:19:35.710529 kernel: acpiphp: Slot [60] registered Oct 29 01:19:35.710535 kernel: acpiphp: Slot [61] registered Oct 29 01:19:35.710541 kernel: acpiphp: Slot [62] registered Oct 29 01:19:35.710547 kernel: acpiphp: Slot [63] registered Oct 29 01:19:35.710598 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Oct 29 01:19:35.710647 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 29 01:19:35.710695 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 29 01:19:35.710744 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 29 01:19:35.710794 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Oct 29 01:19:35.710842 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Oct 29 01:19:35.710902 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Oct 29 01:19:35.710951 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Oct 29 01:19:35.710999 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Oct 29 01:19:35.711054 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Oct 29 01:19:35.711105 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Oct 29 01:19:35.711158 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Oct 29 01:19:35.711209 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 29 01:19:35.711264 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 29 01:19:35.711316 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 29 01:19:35.711367 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 29 01:19:35.711416 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 29 01:19:35.711473 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 29 01:19:35.711526 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 29 01:19:35.711574 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 29 01:19:35.711623 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 29 01:19:35.711671 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 29 01:19:35.711721 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 29 01:19:35.711770 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 29 01:19:35.711818 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 29 01:19:35.711877 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 29 01:19:35.711931 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 29 01:19:35.711978 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 29 01:19:35.712026 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 29 01:19:35.712077 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 29 01:19:35.712126 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 29 01:19:35.712174 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 29 01:19:35.712226 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 29 01:19:35.712275 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 29 01:19:35.712323 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 29 01:19:35.712371 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 29 01:19:35.712421 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 29 01:19:35.712482 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 29 01:19:35.712538 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 29 01:19:35.712588 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 29 01:19:35.712637 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 29 01:19:35.712692 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Oct 29 01:19:35.712744 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Oct 29 01:19:35.712794 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Oct 29 01:19:35.712845 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Oct 29 01:19:35.712894 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Oct 29 01:19:35.712946 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 29 01:19:35.712997 kernel: pci 0000:0b:00.0: supports D1 D2 Oct 29 01:19:35.713047 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 29 01:19:35.713096 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 29 01:19:35.713147 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 29 01:19:35.713196 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 29 01:19:35.713250 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 29 01:19:35.713304 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 29 01:19:35.713353 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 29 01:19:35.713401 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 29 01:19:35.713456 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 29 01:19:35.713509 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 29 01:19:35.713557 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 29 01:19:35.713606 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 29 01:19:35.713655 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 29 01:19:35.713707 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 29 01:19:35.713756 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 29 01:19:35.713804 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 29 01:19:35.713853 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 29 01:19:35.713902 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 29 01:19:35.713951 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 29 01:19:35.714001 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 29 01:19:35.714050 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 29 01:19:35.714100 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 29 01:19:35.714150 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 29 01:19:35.714198 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 29 01:19:35.714246 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 29 01:19:35.714297 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 29 01:19:35.714346 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 29 01:19:35.714394 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 29 01:19:35.722494 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 29 01:19:35.722589 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 29 01:19:35.722645 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 29 01:19:35.722697 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 29 01:19:35.722756 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 29 01:19:35.722811 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 29 01:19:35.722866 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 29 01:19:35.722916 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 29 01:19:35.722972 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 29 01:19:35.723021 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 29 01:19:35.723071 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 29 01:19:35.723119 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 29 01:19:35.723171 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 29 01:19:35.723220 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 29 01:19:35.723282 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 29 01:19:35.723334 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 29 01:19:35.723396 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 29 01:19:35.723460 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 29 01:19:35.723516 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 29 01:19:35.723565 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 29 01:19:35.723614 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 29 01:19:35.723671 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 29 01:19:35.723726 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 29 01:19:35.723775 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 29 01:19:35.723829 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 29 01:19:35.723878 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 29 01:19:35.723928 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 29 01:19:35.723982 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 29 01:19:35.724035 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 29 01:19:35.724085 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 29 01:19:35.724137 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 29 01:19:35.724194 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 29 01:19:35.724246 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 29 01:19:35.724321 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 29 01:19:35.724400 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 29 01:19:35.724491 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 29 01:19:35.724541 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 29 01:19:35.724591 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 29 01:19:35.724642 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 29 01:19:35.724691 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 29 01:19:35.724744 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 29 01:19:35.724794 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 29 01:19:35.724844 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 29 01:19:35.724892 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 29 01:19:35.724942 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 29 01:19:35.724991 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 29 01:19:35.725040 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 29 01:19:35.725091 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 29 01:19:35.725142 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 29 01:19:35.725191 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 29 01:19:35.725243 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 29 01:19:35.725293 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 29 01:19:35.725342 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 29 01:19:35.725351 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Oct 29 01:19:35.725357 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Oct 29 01:19:35.725363 kernel: ACPI: PCI: Interrupt link LNKB disabled Oct 29 01:19:35.725371 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 29 01:19:35.725377 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Oct 29 01:19:35.725383 kernel: iommu: Default domain type: Translated Oct 29 01:19:35.725389 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 29 01:19:35.725444 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Oct 29 01:19:35.725496 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 29 01:19:35.725545 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Oct 29 01:19:35.725554 kernel: vgaarb: loaded Oct 29 01:19:35.725560 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 29 01:19:35.725568 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 29 01:19:35.725574 kernel: PTP clock support registered Oct 29 01:19:35.725580 kernel: PCI: Using ACPI for IRQ routing Oct 29 01:19:35.725585 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 29 01:19:35.725591 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Oct 29 01:19:35.725597 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Oct 29 01:19:35.725603 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Oct 29 01:19:35.725609 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Oct 29 01:19:35.725614 kernel: clocksource: Switched to clocksource tsc-early Oct 29 01:19:35.725621 kernel: VFS: Disk quotas dquot_6.6.0 Oct 29 01:19:35.725627 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 29 01:19:35.725633 kernel: pnp: PnP ACPI init Oct 29 01:19:35.725688 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Oct 29 01:19:35.725735 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Oct 29 01:19:35.725781 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Oct 29 01:19:35.725830 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Oct 29 01:19:35.725881 kernel: pnp 00:06: [dma 2] Oct 29 01:19:35.725933 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Oct 29 01:19:35.725980 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Oct 29 01:19:35.726025 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Oct 29 01:19:35.726033 kernel: pnp: PnP ACPI: found 8 devices Oct 29 01:19:35.726039 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 29 01:19:35.726045 kernel: NET: Registered PF_INET protocol family Oct 29 01:19:35.726052 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 29 01:19:35.726058 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 29 01:19:35.726064 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 29 01:19:35.726070 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 29 01:19:35.726076 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 29 01:19:35.726082 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 29 01:19:35.726088 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 01:19:35.726093 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 01:19:35.726099 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 29 01:19:35.726106 kernel: NET: Registered PF_XDP protocol family Oct 29 01:19:35.726158 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Oct 29 01:19:35.726212 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 29 01:19:35.726269 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 29 01:19:35.726321 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 29 01:19:35.726372 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 29 01:19:35.726427 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Oct 29 01:19:35.726520 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Oct 29 01:19:35.726575 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Oct 29 01:19:35.726626 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Oct 29 01:19:35.726677 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Oct 29 01:19:35.726728 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Oct 29 01:19:35.726783 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Oct 29 01:19:35.726834 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Oct 29 01:19:35.726883 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Oct 29 01:19:35.726933 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Oct 29 01:19:35.726984 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Oct 29 01:19:35.727036 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Oct 29 01:19:35.727098 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Oct 29 01:19:35.727150 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Oct 29 01:19:35.727201 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Oct 29 01:19:35.727250 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Oct 29 01:19:35.727335 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Oct 29 01:19:35.727389 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Oct 29 01:19:35.727466 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Oct 29 01:19:35.727518 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Oct 29 01:19:35.727566 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.727614 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.727663 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.727713 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.727763 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.727812 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.727864 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.727913 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.727963 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728012 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728062 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728110 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728160 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728208 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728261 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728310 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728359 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728407 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728469 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728521 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728570 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728619 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728672 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728721 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728771 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728821 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728870 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.728919 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.728968 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729017 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729070 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729120 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729169 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729217 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729271 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729321 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729370 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729419 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729477 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729527 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729576 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729625 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729674 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729724 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729773 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729831 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729884 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.729941 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.729996 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.730049 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.730103 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.730157 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.730211 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.730266 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.730322 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.730377 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.730434 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.731008 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.731064 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.731115 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.731167 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.731217 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.731268 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.731318 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.731368 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.731420 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.731860 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.731918 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.731970 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.732021 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.732082 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.732134 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.732185 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.732235 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.732291 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.732344 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.732400 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.732733 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.732793 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.732843 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.732894 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.732945 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.732995 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 29 01:19:35.733050 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 29 01:19:35.733108 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 29 01:19:35.733163 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Oct 29 01:19:35.733217 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 29 01:19:35.733273 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 29 01:19:35.733329 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 29 01:19:35.733383 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Oct 29 01:19:35.733434 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 29 01:19:35.733785 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 29 01:19:35.733842 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 29 01:19:35.733914 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Oct 29 01:19:35.733967 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 29 01:19:35.734017 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 29 01:19:35.734067 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 29 01:19:35.734116 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 29 01:19:35.734166 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 29 01:19:35.734215 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 29 01:19:35.734265 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 29 01:19:35.734313 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 29 01:19:35.734365 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 29 01:19:35.734414 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 29 01:19:35.734595 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 29 01:19:35.734648 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 29 01:19:35.734697 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 29 01:19:35.734745 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 29 01:19:35.734796 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 29 01:19:35.734845 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 29 01:19:35.734893 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 29 01:19:35.734943 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 29 01:19:35.734991 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 29 01:19:35.735040 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 29 01:19:35.735088 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 29 01:19:35.735136 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 29 01:19:35.735185 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 29 01:19:35.735247 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Oct 29 01:19:35.735303 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 29 01:19:35.735354 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 29 01:19:35.735403 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 29 01:19:35.735471 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Oct 29 01:19:35.735525 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 29 01:19:35.735575 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 29 01:19:35.735649 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 29 01:19:35.735847 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 29 01:19:35.735906 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 29 01:19:35.735956 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 29 01:19:35.736307 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 29 01:19:35.736366 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 29 01:19:35.736419 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 29 01:19:35.736733 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 29 01:19:35.736790 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 29 01:19:35.736842 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 29 01:19:35.736903 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 29 01:19:35.736964 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 29 01:19:35.737023 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 29 01:19:35.737079 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 29 01:19:35.737128 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 29 01:19:35.737179 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 29 01:19:35.737228 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 29 01:19:35.737277 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 29 01:19:35.737327 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 29 01:19:35.737383 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 29 01:19:35.737433 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 29 01:19:35.737721 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 29 01:19:35.737775 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 29 01:19:35.737827 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 29 01:19:35.737901 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 29 01:19:35.738871 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 29 01:19:35.738928 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 29 01:19:35.738980 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 29 01:19:35.739347 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 29 01:19:35.739405 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 29 01:19:35.739480 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 29 01:19:35.739536 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 29 01:19:35.739587 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 29 01:19:35.739641 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 29 01:19:35.739692 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 29 01:19:35.740046 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 29 01:19:35.740114 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 29 01:19:35.740181 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 29 01:19:35.740267 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 29 01:19:35.740331 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 29 01:19:35.740384 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 29 01:19:35.740434 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 29 01:19:35.740556 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 29 01:19:35.740608 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 29 01:19:35.740656 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 29 01:19:35.740857 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 29 01:19:35.740914 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 29 01:19:35.740964 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 29 01:19:35.741021 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 29 01:19:35.741072 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 29 01:19:35.741125 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 29 01:19:35.741174 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 29 01:19:35.741230 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 29 01:19:35.741280 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 29 01:19:35.741329 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 29 01:19:35.741377 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 29 01:19:35.741435 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 29 01:19:35.741719 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 29 01:19:35.741776 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 29 01:19:35.741830 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 29 01:19:35.741880 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 29 01:19:35.741935 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 29 01:19:35.741986 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 29 01:19:35.742036 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 29 01:19:35.742084 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 29 01:19:35.742135 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 29 01:19:35.742184 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 29 01:19:35.742233 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 29 01:19:35.742290 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 29 01:19:35.742342 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 29 01:19:35.742391 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 29 01:19:35.742718 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 29 01:19:35.742799 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 29 01:19:35.743059 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 29 01:19:35.743115 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Oct 29 01:19:35.743164 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 29 01:19:35.743218 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 29 01:19:35.743275 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Oct 29 01:19:35.743319 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Oct 29 01:19:35.743376 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Oct 29 01:19:35.743427 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Oct 29 01:19:35.743757 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 29 01:19:35.743808 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Oct 29 01:19:35.743955 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Oct 29 01:19:35.744014 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Oct 29 01:19:35.744064 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Oct 29 01:19:35.744110 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Oct 29 01:19:35.744355 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Oct 29 01:19:35.744406 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Oct 29 01:19:35.744475 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Oct 29 01:19:35.744533 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Oct 29 01:19:35.744588 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Oct 29 01:19:35.744643 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Oct 29 01:19:35.744695 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Oct 29 01:19:35.744742 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Oct 29 01:19:35.744789 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Oct 29 01:19:35.744844 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Oct 29 01:19:35.744901 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Oct 29 01:19:35.744956 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Oct 29 01:19:35.745003 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 29 01:19:35.745070 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Oct 29 01:19:35.745119 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Oct 29 01:19:35.745170 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Oct 29 01:19:35.745216 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Oct 29 01:19:35.745267 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Oct 29 01:19:35.745316 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Oct 29 01:19:35.745367 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Oct 29 01:19:35.745414 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Oct 29 01:19:35.745792 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Oct 29 01:19:35.746045 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Oct 29 01:19:35.746105 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Oct 29 01:19:35.746163 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Oct 29 01:19:35.746216 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Oct 29 01:19:35.746294 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Oct 29 01:19:35.746625 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Oct 29 01:19:35.746682 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Oct 29 01:19:35.746829 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 29 01:19:35.746891 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Oct 29 01:19:35.746939 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 29 01:19:35.747194 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Oct 29 01:19:35.747249 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Oct 29 01:19:35.747309 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Oct 29 01:19:35.747363 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Oct 29 01:19:35.747418 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Oct 29 01:19:35.747720 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 29 01:19:35.747974 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Oct 29 01:19:35.748029 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Oct 29 01:19:35.748077 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 29 01:19:35.748130 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Oct 29 01:19:35.748184 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Oct 29 01:19:35.748233 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Oct 29 01:19:35.748287 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Oct 29 01:19:35.748334 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Oct 29 01:19:35.748380 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Oct 29 01:19:35.748430 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Oct 29 01:19:35.748778 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 29 01:19:35.748919 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Oct 29 01:19:35.748980 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 29 01:19:35.749033 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Oct 29 01:19:35.749080 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Oct 29 01:19:35.749433 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Oct 29 01:19:35.749512 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Oct 29 01:19:35.749571 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Oct 29 01:19:35.749624 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 29 01:19:35.749680 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Oct 29 01:19:35.749728 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Oct 29 01:19:35.749774 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Oct 29 01:19:35.749825 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Oct 29 01:19:35.749872 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Oct 29 01:19:35.749921 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Oct 29 01:19:35.749972 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Oct 29 01:19:35.750022 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Oct 29 01:19:35.750076 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Oct 29 01:19:35.750123 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 29 01:19:35.750175 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Oct 29 01:19:35.750225 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Oct 29 01:19:35.750277 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Oct 29 01:19:35.750323 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Oct 29 01:19:35.750377 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Oct 29 01:19:35.750424 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Oct 29 01:19:35.750515 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Oct 29 01:19:35.750565 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 29 01:19:35.750622 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 29 01:19:35.750632 kernel: PCI: CLS 32 bytes, default 64 Oct 29 01:19:35.750639 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 29 01:19:35.750645 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 29 01:19:35.750652 kernel: clocksource: Switched to clocksource tsc Oct 29 01:19:35.750658 kernel: Initialise system trusted keyrings Oct 29 01:19:35.750664 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 29 01:19:35.750672 kernel: Key type asymmetric registered Oct 29 01:19:35.750678 kernel: Asymmetric key parser 'x509' registered Oct 29 01:19:35.750685 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 29 01:19:35.750691 kernel: io scheduler mq-deadline registered Oct 29 01:19:35.750697 kernel: io scheduler kyber registered Oct 29 01:19:35.750703 kernel: io scheduler bfq registered Oct 29 01:19:35.750755 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Oct 29 01:19:35.750806 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.750859 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Oct 29 01:19:35.750911 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.750964 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Oct 29 01:19:35.751013 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751064 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Oct 29 01:19:35.751114 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751165 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Oct 29 01:19:35.751217 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751269 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Oct 29 01:19:35.751320 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751370 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Oct 29 01:19:35.751420 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751494 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Oct 29 01:19:35.751547 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751598 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Oct 29 01:19:35.751647 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751698 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Oct 29 01:19:35.751747 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751799 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Oct 29 01:19:35.751851 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.751902 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Oct 29 01:19:35.751952 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752003 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Oct 29 01:19:35.752052 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752103 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Oct 29 01:19:35.752156 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752206 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Oct 29 01:19:35.752266 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752319 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Oct 29 01:19:35.752371 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752424 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Oct 29 01:19:35.752513 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752572 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Oct 29 01:19:35.752622 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752674 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Oct 29 01:19:35.752727 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752780 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Oct 29 01:19:35.752832 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752883 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Oct 29 01:19:35.752932 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.752983 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Oct 29 01:19:35.753039 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.753100 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Oct 29 01:19:35.753152 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.753201 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Oct 29 01:19:35.753258 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.753311 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Oct 29 01:19:35.753361 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.753415 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Oct 29 01:19:35.753881 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.753942 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Oct 29 01:19:35.753996 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.754050 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Oct 29 01:19:35.754107 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.754166 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Oct 29 01:19:35.754219 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.754274 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Oct 29 01:19:35.754325 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.754377 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Oct 29 01:19:35.754429 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.754490 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Oct 29 01:19:35.754541 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 29 01:19:35.754551 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 29 01:19:35.754558 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 29 01:19:35.754565 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 29 01:19:35.754571 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Oct 29 01:19:35.754580 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 29 01:19:35.754586 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 29 01:19:35.754638 kernel: rtc_cmos 00:01: registered as rtc0 Oct 29 01:19:35.754685 kernel: rtc_cmos 00:01: setting system clock to 2025-10-29T01:19:35 UTC (1761700775) Oct 29 01:19:35.754730 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Oct 29 01:19:35.754739 kernel: intel_pstate: CPU model not supported Oct 29 01:19:35.754745 kernel: NET: Registered PF_INET6 protocol family Oct 29 01:19:35.754751 kernel: Segment Routing with IPv6 Oct 29 01:19:35.754759 kernel: In-situ OAM (IOAM) with IPv6 Oct 29 01:19:35.754765 kernel: NET: Registered PF_PACKET protocol family Oct 29 01:19:35.754772 kernel: Key type dns_resolver registered Oct 29 01:19:35.754778 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 29 01:19:35.754785 kernel: IPI shorthand broadcast: enabled Oct 29 01:19:35.754791 kernel: sched_clock: Marking stable (940076245, 238372830)->(1262564758, -84115683) Oct 29 01:19:35.754798 kernel: registered taskstats version 1 Oct 29 01:19:35.754804 kernel: Loading compiled-in X.509 certificates Oct 29 01:19:35.754810 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 88bc8a4d729b2f514b4a44a35b666d3248ded14a' Oct 29 01:19:35.754817 kernel: Key type .fscrypt registered Oct 29 01:19:35.754824 kernel: Key type fscrypt-provisioning registered Oct 29 01:19:35.754830 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 29 01:19:35.754836 kernel: ima: Allocated hash algorithm: sha1 Oct 29 01:19:35.754842 kernel: ima: No architecture policies found Oct 29 01:19:35.754849 kernel: clk: Disabling unused clocks Oct 29 01:19:35.754855 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 29 01:19:35.754861 kernel: Write protecting the kernel read-only data: 28672k Oct 29 01:19:35.754868 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 29 01:19:35.754875 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 29 01:19:35.754882 kernel: Run /init as init process Oct 29 01:19:35.755202 kernel: with arguments: Oct 29 01:19:35.755210 kernel: /init Oct 29 01:19:35.755219 kernel: with environment: Oct 29 01:19:35.755225 kernel: HOME=/ Oct 29 01:19:35.755231 kernel: TERM=linux Oct 29 01:19:35.755237 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 29 01:19:35.755245 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 01:19:35.755254 systemd[1]: Detected virtualization vmware. Oct 29 01:19:35.755261 systemd[1]: Detected architecture x86-64. Oct 29 01:19:35.755268 systemd[1]: Running in initrd. Oct 29 01:19:35.755274 systemd[1]: No hostname configured, using default hostname. Oct 29 01:19:35.755281 systemd[1]: Hostname set to . Oct 29 01:19:35.755288 systemd[1]: Initializing machine ID from random generator. Oct 29 01:19:35.755296 systemd[1]: Queued start job for default target initrd.target. Oct 29 01:19:35.755307 systemd[1]: Started systemd-ask-password-console.path. Oct 29 01:19:35.755314 systemd[1]: Reached target cryptsetup.target. Oct 29 01:19:35.755320 systemd[1]: Reached target paths.target. Oct 29 01:19:35.755327 systemd[1]: Reached target slices.target. Oct 29 01:19:35.755333 systemd[1]: Reached target swap.target. Oct 29 01:19:35.755340 systemd[1]: Reached target timers.target. Oct 29 01:19:35.755347 systemd[1]: Listening on iscsid.socket. Oct 29 01:19:35.755355 systemd[1]: Listening on iscsiuio.socket. Oct 29 01:19:35.755361 systemd[1]: Listening on systemd-journald-audit.socket. Oct 29 01:19:35.755368 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 29 01:19:35.755375 systemd[1]: Listening on systemd-journald.socket. Oct 29 01:19:35.755382 systemd[1]: Listening on systemd-networkd.socket. Oct 29 01:19:35.755388 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 01:19:35.755565 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 01:19:35.755577 systemd[1]: Reached target sockets.target. Oct 29 01:19:35.755584 systemd[1]: Starting kmod-static-nodes.service... Oct 29 01:19:35.755593 systemd[1]: Finished network-cleanup.service. Oct 29 01:19:35.756561 systemd[1]: Starting systemd-fsck-usr.service... Oct 29 01:19:35.756571 systemd[1]: Starting systemd-journald.service... Oct 29 01:19:35.756578 systemd[1]: Starting systemd-modules-load.service... Oct 29 01:19:35.756585 systemd[1]: Starting systemd-resolved.service... Oct 29 01:19:35.756591 systemd[1]: Starting systemd-vconsole-setup.service... Oct 29 01:19:35.756598 systemd[1]: Finished kmod-static-nodes.service. Oct 29 01:19:35.756605 systemd[1]: Finished systemd-fsck-usr.service. Oct 29 01:19:35.756611 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 29 01:19:35.756621 systemd[1]: Finished systemd-vconsole-setup.service. Oct 29 01:19:35.756628 kernel: audit: type=1130 audit(1761700775.686:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.756636 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 29 01:19:35.756643 kernel: audit: type=1130 audit(1761700775.690:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.756649 systemd[1]: Starting dracut-cmdline-ask.service... Oct 29 01:19:35.756655 systemd[1]: Finished dracut-cmdline-ask.service. Oct 29 01:19:35.756662 kernel: audit: type=1130 audit(1761700775.703:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.756669 systemd[1]: Starting dracut-cmdline.service... Oct 29 01:19:35.756677 systemd[1]: Started systemd-resolved.service. Oct 29 01:19:35.756684 kernel: audit: type=1130 audit(1761700775.717:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.756691 systemd[1]: Reached target nss-lookup.target. Oct 29 01:19:35.756698 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 29 01:19:35.756706 kernel: Bridge firewalling registered Oct 29 01:19:35.756716 systemd-journald[217]: Journal started Oct 29 01:19:35.756754 systemd-journald[217]: Runtime Journal (/run/log/journal/874446b71f384747bcbe14a127e69424) is 4.8M, max 38.8M, 34.0M free. Oct 29 01:19:35.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.679413 systemd-modules-load[218]: Inserted module 'overlay' Oct 29 01:19:35.760531 systemd[1]: Started systemd-journald.service. Oct 29 01:19:35.760553 kernel: audit: type=1130 audit(1761700775.756:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.707559 systemd-resolved[219]: Positive Trust Anchors: Oct 29 01:19:35.707565 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 01:19:35.707585 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 01:19:35.762705 kernel: SCSI subsystem initialized Oct 29 01:19:35.716726 systemd-resolved[219]: Defaulting to hostname 'linux'. Oct 29 01:19:35.741565 systemd-modules-load[218]: Inserted module 'br_netfilter' Oct 29 01:19:35.763498 dracut-cmdline[233]: dracut-dracut-053 Oct 29 01:19:35.763498 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 29 01:19:35.763498 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 01:19:35.773680 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 29 01:19:35.773721 kernel: device-mapper: uevent: version 1.0.3 Oct 29 01:19:35.773729 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 29 01:19:35.781103 kernel: Loading iSCSI transport class v2.0-870. Oct 29 01:19:35.781139 kernel: audit: type=1130 audit(1761700775.776:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.777227 systemd-modules-load[218]: Inserted module 'dm_multipath' Oct 29 01:19:35.777668 systemd[1]: Finished systemd-modules-load.service. Oct 29 01:19:35.778196 systemd[1]: Starting systemd-sysctl.service... Oct 29 01:19:35.785527 systemd[1]: Finished systemd-sysctl.service. Oct 29 01:19:35.788233 kernel: audit: type=1130 audit(1761700775.784:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.792464 kernel: iscsi: registered transport (tcp) Oct 29 01:19:35.810461 kernel: iscsi: registered transport (qla4xxx) Oct 29 01:19:35.810502 kernel: QLogic iSCSI HBA Driver Oct 29 01:19:35.830667 systemd[1]: Finished dracut-cmdline.service. Oct 29 01:19:35.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.831375 systemd[1]: Starting dracut-pre-udev.service... Oct 29 01:19:35.834456 kernel: audit: type=1130 audit(1761700775.829:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:35.874481 kernel: raid6: avx2x4 gen() 34076 MB/s Oct 29 01:19:35.891458 kernel: raid6: avx2x4 xor() 18984 MB/s Oct 29 01:19:35.908457 kernel: raid6: avx2x2 gen() 52562 MB/s Oct 29 01:19:35.925465 kernel: raid6: avx2x2 xor() 31691 MB/s Oct 29 01:19:35.942466 kernel: raid6: avx2x1 gen() 43397 MB/s Oct 29 01:19:35.959461 kernel: raid6: avx2x1 xor() 24725 MB/s Oct 29 01:19:35.976464 kernel: raid6: sse2x4 gen() 20687 MB/s Oct 29 01:19:35.993468 kernel: raid6: sse2x4 xor() 11475 MB/s Oct 29 01:19:36.010478 kernel: raid6: sse2x2 gen() 21149 MB/s Oct 29 01:19:36.027460 kernel: raid6: sse2x2 xor() 13238 MB/s Oct 29 01:19:36.044461 kernel: raid6: sse2x1 gen() 18108 MB/s Oct 29 01:19:36.061680 kernel: raid6: sse2x1 xor() 8875 MB/s Oct 29 01:19:36.061729 kernel: raid6: using algorithm avx2x2 gen() 52562 MB/s Oct 29 01:19:36.061753 kernel: raid6: .... xor() 31691 MB/s, rmw enabled Oct 29 01:19:36.062890 kernel: raid6: using avx2x2 recovery algorithm Oct 29 01:19:36.071460 kernel: xor: automatically using best checksumming function avx Oct 29 01:19:36.139468 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 29 01:19:36.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:36.145742 systemd[1]: Finished dracut-pre-udev.service. Oct 29 01:19:36.144000 audit: BPF prog-id=7 op=LOAD Oct 29 01:19:36.144000 audit: BPF prog-id=8 op=LOAD Oct 29 01:19:36.146540 systemd[1]: Starting systemd-udevd.service... Oct 29 01:19:36.151479 kernel: audit: type=1130 audit(1761700776.144:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:36.157812 systemd-udevd[415]: Using default interface naming scheme 'v252'. Oct 29 01:19:36.160866 systemd[1]: Started systemd-udevd.service. Oct 29 01:19:36.162854 systemd[1]: Starting dracut-pre-trigger.service... Oct 29 01:19:36.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:36.172015 dracut-pre-trigger[429]: rd.md=0: removing MD RAID activation Oct 29 01:19:36.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:36.193162 systemd[1]: Finished dracut-pre-trigger.service. Oct 29 01:19:36.193847 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 01:19:36.269598 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 01:19:36.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:36.327834 kernel: VMware PVSCSI driver - version 1.0.7.0-k Oct 29 01:19:36.327872 kernel: vmw_pvscsi: using 64bit dma Oct 29 01:19:36.334621 kernel: vmw_pvscsi: max_id: 16 Oct 29 01:19:36.334642 kernel: vmw_pvscsi: setting ring_pages to 8 Oct 29 01:19:36.345224 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Oct 29 01:19:36.345259 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Oct 29 01:19:36.366223 kernel: vmw_pvscsi: enabling reqCallThreshold Oct 29 01:19:36.366235 kernel: vmw_pvscsi: driver-based request coalescing enabled Oct 29 01:19:36.366247 kernel: vmw_pvscsi: using MSI-X Oct 29 01:19:36.366255 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Oct 29 01:19:36.366325 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Oct 29 01:19:36.366387 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Oct 29 01:19:36.366467 kernel: cryptd: max_cpu_qlen set to 1000 Oct 29 01:19:36.366484 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Oct 29 01:19:36.371455 kernel: AVX2 version of gcm_enc/dec engaged. Oct 29 01:19:36.371491 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Oct 29 01:19:36.372454 kernel: libata version 3.00 loaded. Oct 29 01:19:36.373451 kernel: AES CTR mode by8 optimization enabled Oct 29 01:19:36.374452 kernel: ata_piix 0000:00:07.1: version 2.13 Oct 29 01:19:36.383054 kernel: scsi host1: ata_piix Oct 29 01:19:36.383131 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Oct 29 01:19:36.426404 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 29 01:19:36.426510 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Oct 29 01:19:36.426613 kernel: sd 0:0:0:0: [sda] Cache data unavailable Oct 29 01:19:36.426693 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Oct 29 01:19:36.426782 kernel: scsi host2: ata_piix Oct 29 01:19:36.426853 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Oct 29 01:19:36.426861 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Oct 29 01:19:36.426868 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 29 01:19:36.426878 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 29 01:19:36.551469 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Oct 29 01:19:36.556491 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Oct 29 01:19:36.589626 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Oct 29 01:19:36.610605 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 29 01:19:36.610624 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (473) Oct 29 01:19:36.610637 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 29 01:19:36.613665 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 01:19:36.617680 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 29 01:19:36.637626 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 29 01:19:36.660630 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 29 01:19:36.660934 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 29 01:19:36.661706 systemd[1]: Starting disk-uuid.service... Oct 29 01:19:36.723469 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 29 01:19:36.729455 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 29 01:19:37.804356 disk-uuid[549]: The operation has completed successfully. Oct 29 01:19:37.804594 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 29 01:19:38.199720 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 29 01:19:38.199782 systemd[1]: Finished disk-uuid.service. Oct 29 01:19:38.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:38.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:38.200422 systemd[1]: Starting verity-setup.service... Oct 29 01:19:38.247457 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Oct 29 01:19:38.836346 systemd[1]: Found device dev-mapper-usr.device. Oct 29 01:19:38.836846 systemd[1]: Mounting sysusr-usr.mount... Oct 29 01:19:38.837806 systemd[1]: Finished verity-setup.service. Oct 29 01:19:38.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.027217 systemd[1]: Mounted sysusr-usr.mount. Oct 29 01:19:39.027504 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 29 01:19:39.027938 systemd[1]: Starting afterburn-network-kargs.service... Oct 29 01:19:39.028495 systemd[1]: Starting ignition-setup.service... Oct 29 01:19:39.046776 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 01:19:39.046815 kernel: BTRFS info (device sda6): using free space tree Oct 29 01:19:39.046824 kernel: BTRFS info (device sda6): has skinny extents Oct 29 01:19:39.054491 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 29 01:19:39.064572 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 29 01:19:39.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.084162 systemd[1]: Finished ignition-setup.service. Oct 29 01:19:39.084837 systemd[1]: Starting ignition-fetch-offline.service... Oct 29 01:19:39.510773 systemd[1]: Finished afterburn-network-kargs.service. Oct 29 01:19:39.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.511739 systemd[1]: Starting parse-ip-for-networkd.service... Oct 29 01:19:39.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.556000 audit: BPF prog-id=9 op=LOAD Oct 29 01:19:39.557205 systemd[1]: Finished parse-ip-for-networkd.service. Oct 29 01:19:39.558205 systemd[1]: Starting systemd-networkd.service... Oct 29 01:19:39.573460 systemd-networkd[728]: lo: Link UP Oct 29 01:19:39.573468 systemd-networkd[728]: lo: Gained carrier Oct 29 01:19:39.573825 systemd-networkd[728]: Enumeration completed Oct 29 01:19:39.574100 systemd-networkd[728]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Oct 29 01:19:39.578414 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 29 01:19:39.578557 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 29 01:19:39.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.574355 systemd[1]: Started systemd-networkd.service. Oct 29 01:19:39.574538 systemd[1]: Reached target network.target. Oct 29 01:19:39.575150 systemd[1]: Starting iscsiuio.service... Oct 29 01:19:39.577019 systemd-networkd[728]: ens192: Link UP Oct 29 01:19:39.577023 systemd-networkd[728]: ens192: Gained carrier Oct 29 01:19:39.580347 systemd[1]: Started iscsiuio.service. Oct 29 01:19:39.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.580971 systemd[1]: Starting iscsid.service... Oct 29 01:19:39.583295 iscsid[733]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 29 01:19:39.583295 iscsid[733]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 29 01:19:39.583295 iscsid[733]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 29 01:19:39.583295 iscsid[733]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 29 01:19:39.584248 iscsid[733]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 29 01:19:39.584248 iscsid[733]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 29 01:19:39.585337 systemd[1]: Started iscsid.service. Oct 29 01:19:39.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.586209 systemd[1]: Starting dracut-initqueue.service... Oct 29 01:19:39.593927 systemd[1]: Finished dracut-initqueue.service. Oct 29 01:19:39.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:39.594359 systemd[1]: Reached target remote-fs-pre.target. Oct 29 01:19:39.594623 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 01:19:39.594848 systemd[1]: Reached target remote-fs.target. Oct 29 01:19:39.595572 systemd[1]: Starting dracut-pre-mount.service... Oct 29 01:19:39.601413 systemd[1]: Finished dracut-pre-mount.service. Oct 29 01:19:39.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.518557 ignition[604]: Ignition 2.14.0 Oct 29 01:19:40.518938 ignition[604]: Stage: fetch-offline Oct 29 01:19:40.519159 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 01:19:40.519401 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 29 01:19:40.570477 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 29 01:19:40.570791 ignition[604]: parsed url from cmdline: "" Oct 29 01:19:40.570828 ignition[604]: no config URL provided Oct 29 01:19:40.570945 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 01:19:40.571103 ignition[604]: no config at "/usr/lib/ignition/user.ign" Oct 29 01:19:40.571616 ignition[604]: config successfully fetched Oct 29 01:19:40.571659 ignition[604]: parsing config with SHA512: 7eb19e5deb37ca4a3694ed4ff514864bd5035b6864c3f7be5f17263d957e8747fe8be7f8a84bf62dc7914217790277b27c1ca5cca09f03c2bf2335f34abda7cf Oct 29 01:19:40.580825 unknown[604]: fetched base config from "system" Oct 29 01:19:40.580837 unknown[604]: fetched user config from "vmware" Oct 29 01:19:40.581202 ignition[604]: fetch-offline: fetch-offline passed Oct 29 01:19:40.581279 ignition[604]: Ignition finished successfully Oct 29 01:19:40.581976 systemd[1]: Finished ignition-fetch-offline.service. Oct 29 01:19:40.585837 kernel: kauditd_printk_skb: 17 callbacks suppressed Oct 29 01:19:40.585852 kernel: audit: type=1130 audit(1761700780.580:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.582122 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 29 01:19:40.582616 systemd[1]: Starting ignition-kargs.service... Oct 29 01:19:40.591303 ignition[752]: Ignition 2.14.0 Oct 29 01:19:40.591310 ignition[752]: Stage: kargs Oct 29 01:19:40.591373 ignition[752]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 01:19:40.591383 ignition[752]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 29 01:19:40.592667 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 29 01:19:40.594024 ignition[752]: kargs: kargs passed Oct 29 01:19:40.594056 ignition[752]: Ignition finished successfully Oct 29 01:19:40.595083 systemd[1]: Finished ignition-kargs.service. Oct 29 01:19:40.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.595705 systemd[1]: Starting ignition-disks.service... Oct 29 01:19:40.598499 kernel: audit: type=1130 audit(1761700780.593:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.601020 ignition[759]: Ignition 2.14.0 Oct 29 01:19:40.601227 ignition[759]: Stage: disks Oct 29 01:19:40.601407 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 01:19:40.601581 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 29 01:19:40.602968 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 29 01:19:40.604392 ignition[759]: disks: disks passed Oct 29 01:19:40.604434 ignition[759]: Ignition finished successfully Oct 29 01:19:40.605096 systemd[1]: Finished ignition-disks.service. Oct 29 01:19:40.605278 systemd[1]: Reached target initrd-root-device.target. Oct 29 01:19:40.608004 kernel: audit: type=1130 audit(1761700780.603:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.607905 systemd[1]: Reached target local-fs-pre.target. Oct 29 01:19:40.608048 systemd[1]: Reached target local-fs.target. Oct 29 01:19:40.608148 systemd[1]: Reached target sysinit.target. Oct 29 01:19:40.608309 systemd[1]: Reached target basic.target. Oct 29 01:19:40.608991 systemd[1]: Starting systemd-fsck-root.service... Oct 29 01:19:40.716457 systemd-fsck[767]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 29 01:19:40.721142 systemd[1]: Finished systemd-fsck-root.service. Oct 29 01:19:40.724714 kernel: audit: type=1130 audit(1761700780.719:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.721873 systemd[1]: Mounting sysroot.mount... Oct 29 01:19:40.737158 systemd[1]: Mounted sysroot.mount. Oct 29 01:19:40.737346 systemd[1]: Reached target initrd-root-fs.target. Oct 29 01:19:40.737624 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 29 01:19:40.738997 systemd[1]: Mounting sysroot-usr.mount... Oct 29 01:19:40.739540 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 29 01:19:40.739574 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 29 01:19:40.739598 systemd[1]: Reached target ignition-diskful.target. Oct 29 01:19:40.740996 systemd[1]: Mounted sysroot-usr.mount. Oct 29 01:19:40.743827 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 29 01:19:40.744499 systemd[1]: Starting initrd-setup-root.service... Oct 29 01:19:40.748457 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory Oct 29 01:19:40.751018 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory Oct 29 01:19:40.753774 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory Oct 29 01:19:40.756679 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (773) Oct 29 01:19:40.756715 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 01:19:40.758590 kernel: BTRFS info (device sda6): using free space tree Oct 29 01:19:40.758627 kernel: BTRFS info (device sda6): has skinny extents Oct 29 01:19:40.761914 initrd-setup-root[818]: cut: /sysroot/etc/gshadow: No such file or directory Oct 29 01:19:40.763657 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 29 01:19:40.765159 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 29 01:19:40.809748 systemd[1]: Finished initrd-setup-root.service. Oct 29 01:19:40.813791 kernel: audit: type=1130 audit(1761700780.808:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.810570 systemd[1]: Starting ignition-mount.service... Oct 29 01:19:40.814332 systemd[1]: Starting sysroot-boot.service... Oct 29 01:19:40.816315 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 29 01:19:40.816379 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 29 01:19:40.829198 ignition[838]: INFO : Ignition 2.14.0 Oct 29 01:19:40.829523 ignition[838]: INFO : Stage: mount Oct 29 01:19:40.829714 ignition[838]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 01:19:40.829870 ignition[838]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 29 01:19:40.831333 ignition[838]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 29 01:19:40.832712 ignition[838]: INFO : mount: mount passed Oct 29 01:19:40.832856 ignition[838]: INFO : Ignition finished successfully Oct 29 01:19:40.833436 systemd[1]: Finished ignition-mount.service. Oct 29 01:19:40.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.834105 systemd[1]: Starting ignition-files.service... Oct 29 01:19:40.836678 kernel: audit: type=1130 audit(1761700780.832:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.838481 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 29 01:19:40.935465 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (845) Oct 29 01:19:40.948631 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 01:19:40.948666 kernel: BTRFS info (device sda6): using free space tree Oct 29 01:19:40.948678 kernel: BTRFS info (device sda6): has skinny extents Oct 29 01:19:40.961525 systemd[1]: Finished sysroot-boot.service. Oct 29 01:19:40.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.965456 kernel: audit: type=1130 audit(1761700780.960:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:40.993467 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 29 01:19:40.996533 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 29 01:19:41.003713 ignition[867]: INFO : Ignition 2.14.0 Oct 29 01:19:41.004066 ignition[867]: INFO : Stage: files Oct 29 01:19:41.004310 ignition[867]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 01:19:41.004549 ignition[867]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 29 01:19:41.006634 ignition[867]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 29 01:19:41.008904 ignition[867]: DEBUG : files: compiled without relabeling support, skipping Oct 29 01:19:41.009745 ignition[867]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 29 01:19:41.009960 ignition[867]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 29 01:19:41.014098 ignition[867]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 29 01:19:41.014405 ignition[867]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 29 01:19:41.015541 unknown[867]: wrote ssh authorized keys file for user: core Oct 29 01:19:41.015814 ignition[867]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 29 01:19:41.017087 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 29 01:19:41.017501 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 29 01:19:41.017961 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 01:19:41.018267 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 01:19:41.018531 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 29 01:19:41.018875 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 29 01:19:41.019660 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 29 01:19:41.019937 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Oct 29 01:19:41.023800 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem903741297" Oct 29 01:19:41.024071 ignition[867]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem903741297": device or resource busy Oct 29 01:19:41.024288 ignition[867]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem903741297", trying btrfs: device or resource busy Oct 29 01:19:41.024526 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem903741297" Oct 29 01:19:41.024810 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem903741297" Oct 29 01:19:41.025595 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem903741297" Oct 29 01:19:41.025808 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem903741297" Oct 29 01:19:41.026028 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 29 01:19:41.026252 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 29 01:19:41.026540 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.34.1-x86-64.raw: attempt #1 Oct 29 01:19:41.482677 systemd-networkd[728]: ens192: Gained IPv6LL Oct 29 01:19:41.542749 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 29 01:19:41.870606 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 29 01:19:41.879781 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 29 01:19:41.880160 ignition[867]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 29 01:19:41.880367 ignition[867]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Oct 29 01:19:41.880532 ignition[867]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Oct 29 01:19:41.880674 ignition[867]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Oct 29 01:19:41.880859 ignition[867]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 29 01:19:41.881106 ignition[867]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 29 01:19:41.881305 ignition[867]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Oct 29 01:19:41.881467 ignition[867]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" Oct 29 01:19:41.881688 ignition[867]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" Oct 29 01:19:41.881864 ignition[867]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Oct 29 01:19:41.882061 ignition[867]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 29 01:19:42.764949 ignition[867]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 29 01:19:42.765295 ignition[867]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Oct 29 01:19:42.765295 ignition[867]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 29 01:19:42.765295 ignition[867]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 29 01:19:42.765295 ignition[867]: INFO : files: files passed Oct 29 01:19:42.765295 ignition[867]: INFO : Ignition finished successfully Oct 29 01:19:42.767383 systemd[1]: Finished ignition-files.service. Oct 29 01:19:42.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.768224 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 29 01:19:42.770580 kernel: audit: type=1130 audit(1761700782.766:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.770321 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 29 01:19:42.770787 systemd[1]: Starting ignition-quench.service... Oct 29 01:19:42.781526 initrd-setup-root-after-ignition[893]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 29 01:19:42.782177 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 29 01:19:42.784908 kernel: audit: type=1130 audit(1761700782.780:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.782363 systemd[1]: Reached target ignition-complete.target. Oct 29 01:19:42.785393 systemd[1]: Starting initrd-parse-etc.service... Oct 29 01:19:42.788747 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 29 01:19:42.788801 systemd[1]: Finished ignition-quench.service. Oct 29 01:19:42.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.792488 kernel: audit: type=1130 audit(1761700782.787:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.794490 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 29 01:19:42.794544 systemd[1]: Finished initrd-parse-etc.service. Oct 29 01:19:42.794774 systemd[1]: Reached target initrd-fs.target. Oct 29 01:19:42.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.794881 systemd[1]: Reached target initrd.target. Oct 29 01:19:42.795052 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 29 01:19:42.795484 systemd[1]: Starting dracut-pre-pivot.service... Oct 29 01:19:42.802014 systemd[1]: Finished dracut-pre-pivot.service. Oct 29 01:19:42.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.802543 systemd[1]: Starting initrd-cleanup.service... Oct 29 01:19:42.808286 systemd[1]: Stopped target nss-lookup.target. Oct 29 01:19:42.808580 systemd[1]: Stopped target remote-cryptsetup.target. Oct 29 01:19:42.808864 systemd[1]: Stopped target timers.target. Oct 29 01:19:42.809123 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 29 01:19:42.809323 systemd[1]: Stopped dracut-pre-pivot.service. Oct 29 01:19:42.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.809697 systemd[1]: Stopped target initrd.target. Oct 29 01:19:42.809950 systemd[1]: Stopped target basic.target. Oct 29 01:19:42.810202 systemd[1]: Stopped target ignition-complete.target. Oct 29 01:19:42.810479 systemd[1]: Stopped target ignition-diskful.target. Oct 29 01:19:42.810737 systemd[1]: Stopped target initrd-root-device.target. Oct 29 01:19:42.811001 systemd[1]: Stopped target remote-fs.target. Oct 29 01:19:42.811253 systemd[1]: Stopped target remote-fs-pre.target. Oct 29 01:19:42.811524 systemd[1]: Stopped target sysinit.target. Oct 29 01:19:42.811781 systemd[1]: Stopped target local-fs.target. Oct 29 01:19:42.812031 systemd[1]: Stopped target local-fs-pre.target. Oct 29 01:19:42.812289 systemd[1]: Stopped target swap.target. Oct 29 01:19:42.812526 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 29 01:19:42.812721 systemd[1]: Stopped dracut-pre-mount.service. Oct 29 01:19:42.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.813055 systemd[1]: Stopped target cryptsetup.target. Oct 29 01:19:42.813298 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 29 01:19:42.813504 systemd[1]: Stopped dracut-initqueue.service. Oct 29 01:19:42.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.813818 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 29 01:19:42.814021 systemd[1]: Stopped ignition-fetch-offline.service. Oct 29 01:19:42.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.814359 systemd[1]: Stopped target paths.target. Oct 29 01:19:42.814600 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 29 01:19:42.818465 systemd[1]: Stopped systemd-ask-password-console.path. Oct 29 01:19:42.818744 systemd[1]: Stopped target slices.target. Oct 29 01:19:42.818998 systemd[1]: Stopped target sockets.target. Oct 29 01:19:42.819258 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 29 01:19:42.819488 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 29 01:19:42.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.819818 systemd[1]: ignition-files.service: Deactivated successfully. Oct 29 01:19:42.820021 systemd[1]: Stopped ignition-files.service. Oct 29 01:19:42.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.820819 systemd[1]: Stopping ignition-mount.service... Oct 29 01:19:42.821207 systemd[1]: Stopping iscsid.service... Oct 29 01:19:42.821409 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 29 01:19:42.821611 systemd[1]: Stopped kmod-static-nodes.service. Oct 29 01:19:42.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.823752 iscsid[733]: iscsid shutting down. Oct 29 01:19:42.825359 ignition[906]: INFO : Ignition 2.14.0 Oct 29 01:19:42.825739 ignition[906]: INFO : Stage: umount Oct 29 01:19:42.825925 ignition[906]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 01:19:42.826082 ignition[906]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 29 01:19:42.827665 ignition[906]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 29 01:19:42.828341 systemd[1]: Stopping sysroot-boot.service... Oct 29 01:19:42.828662 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 29 01:19:42.828881 systemd[1]: Stopped systemd-udev-trigger.service. Oct 29 01:19:42.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.829219 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 29 01:19:42.829419 systemd[1]: Stopped dracut-pre-trigger.service. Oct 29 01:19:42.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.830665 systemd[1]: iscsid.service: Deactivated successfully. Oct 29 01:19:42.830863 systemd[1]: Stopped iscsid.service. Oct 29 01:19:42.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.832763 systemd[1]: iscsid.socket: Deactivated successfully. Oct 29 01:19:42.832938 systemd[1]: Closed iscsid.socket. Oct 29 01:19:42.833200 systemd[1]: Stopping iscsiuio.service... Oct 29 01:19:42.833553 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 29 01:19:42.834744 systemd[1]: Finished initrd-cleanup.service. Oct 29 01:19:42.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.835299 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 29 01:19:42.835525 systemd[1]: Stopped iscsiuio.service. Oct 29 01:19:42.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.836278 ignition[906]: INFO : umount: umount passed Oct 29 01:19:42.836398 ignition[906]: INFO : Ignition finished successfully Oct 29 01:19:42.837480 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 29 01:19:42.837678 systemd[1]: Stopped ignition-mount.service. Oct 29 01:19:42.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.837972 systemd[1]: Stopped target network.target. Oct 29 01:19:42.838189 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 29 01:19:42.838335 systemd[1]: Closed iscsiuio.socket. Oct 29 01:19:42.838571 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 29 01:19:42.838725 systemd[1]: Stopped ignition-disks.service. Oct 29 01:19:42.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.838981 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 29 01:19:42.839131 systemd[1]: Stopped ignition-kargs.service. Oct 29 01:19:42.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.839386 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 29 01:19:42.839570 systemd[1]: Stopped ignition-setup.service. Oct 29 01:19:42.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.839877 systemd[1]: Stopping systemd-networkd.service... Oct 29 01:19:42.840183 systemd[1]: Stopping systemd-resolved.service... Oct 29 01:19:42.843021 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 29 01:19:42.843214 systemd[1]: Stopped systemd-networkd.service. Oct 29 01:19:42.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.844638 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 29 01:19:42.844843 systemd[1]: Stopped systemd-resolved.service. Oct 29 01:19:42.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.845502 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 29 01:19:42.845662 systemd[1]: Closed systemd-networkd.socket. Oct 29 01:19:42.846294 systemd[1]: Stopping network-cleanup.service... Oct 29 01:19:42.846611 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 29 01:19:42.846777 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 29 01:19:42.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.847069 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Oct 29 01:19:42.847236 systemd[1]: Stopped afterburn-network-kargs.service. Oct 29 01:19:42.846000 audit: BPF prog-id=9 op=UNLOAD Oct 29 01:19:42.846000 audit: BPF prog-id=6 op=UNLOAD Oct 29 01:19:42.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.847874 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 29 01:19:42.848058 systemd[1]: Stopped systemd-sysctl.service. Oct 29 01:19:42.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.848358 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 29 01:19:42.848530 systemd[1]: Stopped systemd-modules-load.service. Oct 29 01:19:42.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.850757 systemd[1]: Stopping systemd-udevd.service... Oct 29 01:19:42.851793 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 29 01:19:42.854342 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 29 01:19:42.854416 systemd[1]: Stopped network-cleanup.service. Oct 29 01:19:42.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.855434 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 29 01:19:42.855597 systemd[1]: Stopped systemd-udevd.service. Oct 29 01:19:42.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.855962 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 29 01:19:42.855992 systemd[1]: Closed systemd-udevd-control.socket. Oct 29 01:19:42.856367 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 29 01:19:42.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.856396 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 29 01:19:42.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.856888 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 29 01:19:42.856917 systemd[1]: Stopped dracut-pre-udev.service. Oct 29 01:19:42.857070 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 29 01:19:42.857091 systemd[1]: Stopped dracut-cmdline.service. Oct 29 01:19:42.857250 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 29 01:19:42.857270 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 29 01:19:42.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.857924 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 29 01:19:42.858045 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 29 01:19:42.858084 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 29 01:19:42.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.861988 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 29 01:19:42.862061 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 29 01:19:42.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.867333 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 29 01:19:42.883764 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 29 01:19:42.883846 systemd[1]: Stopped sysroot-boot.service. Oct 29 01:19:42.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.884113 systemd[1]: Reached target initrd-switch-root.target. Oct 29 01:19:42.884238 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 29 01:19:42.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:42.884265 systemd[1]: Stopped initrd-setup-root.service. Oct 29 01:19:42.884898 systemd[1]: Starting initrd-switch-root.service... Oct 29 01:19:42.893266 systemd[1]: Switching root. Oct 29 01:19:42.912723 systemd-journald[217]: Journal stopped Oct 29 01:19:46.777118 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Oct 29 01:19:46.777151 kernel: SELinux: Class mctp_socket not defined in policy. Oct 29 01:19:46.777162 kernel: SELinux: Class anon_inode not defined in policy. Oct 29 01:19:46.777168 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 29 01:19:46.777174 kernel: SELinux: policy capability network_peer_controls=1 Oct 29 01:19:46.777181 kernel: SELinux: policy capability open_perms=1 Oct 29 01:19:46.777187 kernel: SELinux: policy capability extended_socket_class=1 Oct 29 01:19:46.777193 kernel: SELinux: policy capability always_check_network=0 Oct 29 01:19:46.777199 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 29 01:19:46.777205 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 29 01:19:46.777211 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 29 01:19:46.777217 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 29 01:19:46.777224 systemd[1]: Successfully loaded SELinux policy in 113.714ms. Oct 29 01:19:46.777232 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.164ms. Oct 29 01:19:46.777240 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 01:19:46.777247 systemd[1]: Detected virtualization vmware. Oct 29 01:19:46.777254 systemd[1]: Detected architecture x86-64. Oct 29 01:19:46.777260 systemd[1]: Detected first boot. Oct 29 01:19:46.777267 systemd[1]: Initializing machine ID from random generator. Oct 29 01:19:46.777274 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 29 01:19:46.777281 systemd[1]: Populated /etc with preset unit settings. Oct 29 01:19:46.777288 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 01:19:46.777295 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 01:19:46.777302 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 01:19:46.777310 kernel: kauditd_printk_skb: 55 callbacks suppressed Oct 29 01:19:46.777317 kernel: audit: type=1334 audit(1761700786.588:86): prog-id=12 op=LOAD Oct 29 01:19:46.777323 kernel: audit: type=1334 audit(1761700786.588:87): prog-id=3 op=UNLOAD Oct 29 01:19:46.777329 kernel: audit: type=1334 audit(1761700786.589:88): prog-id=13 op=LOAD Oct 29 01:19:46.777335 kernel: audit: type=1334 audit(1761700786.590:89): prog-id=14 op=LOAD Oct 29 01:19:46.777341 kernel: audit: type=1334 audit(1761700786.590:90): prog-id=4 op=UNLOAD Oct 29 01:19:46.777347 kernel: audit: type=1334 audit(1761700786.590:91): prog-id=5 op=UNLOAD Oct 29 01:19:46.777355 kernel: audit: type=1334 audit(1761700786.592:92): prog-id=15 op=LOAD Oct 29 01:19:46.777361 kernel: audit: type=1334 audit(1761700786.592:93): prog-id=12 op=UNLOAD Oct 29 01:19:46.777367 kernel: audit: type=1334 audit(1761700786.594:94): prog-id=16 op=LOAD Oct 29 01:19:46.777373 kernel: audit: type=1334 audit(1761700786.596:95): prog-id=17 op=LOAD Oct 29 01:19:46.777379 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 29 01:19:46.777385 systemd[1]: Stopped initrd-switch-root.service. Oct 29 01:19:46.777392 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 29 01:19:46.777400 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 29 01:19:46.777409 systemd[1]: Created slice system-addon\x2drun.slice. Oct 29 01:19:46.777417 systemd[1]: Created slice system-getty.slice. Oct 29 01:19:46.777424 systemd[1]: Created slice system-modprobe.slice. Oct 29 01:19:46.777431 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 29 01:19:46.777820 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 29 01:19:46.777851 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 29 01:19:46.777866 systemd[1]: Created slice user.slice. Oct 29 01:19:46.777878 systemd[1]: Started systemd-ask-password-console.path. Oct 29 01:19:46.777894 systemd[1]: Started systemd-ask-password-wall.path. Oct 29 01:19:46.777906 systemd[1]: Set up automount boot.automount. Oct 29 01:19:46.777918 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 29 01:19:46.777930 systemd[1]: Stopped target initrd-switch-root.target. Oct 29 01:19:46.777942 systemd[1]: Stopped target initrd-fs.target. Oct 29 01:19:46.777953 systemd[1]: Stopped target initrd-root-fs.target. Oct 29 01:19:46.777960 systemd[1]: Reached target integritysetup.target. Oct 29 01:19:46.777967 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 01:19:46.777976 systemd[1]: Reached target remote-fs.target. Oct 29 01:19:46.777987 systemd[1]: Reached target slices.target. Oct 29 01:19:46.777999 systemd[1]: Reached target swap.target. Oct 29 01:19:46.778011 systemd[1]: Reached target torcx.target. Oct 29 01:19:46.778020 systemd[1]: Reached target veritysetup.target. Oct 29 01:19:46.778027 systemd[1]: Listening on systemd-coredump.socket. Oct 29 01:19:46.778034 systemd[1]: Listening on systemd-initctl.socket. Oct 29 01:19:46.778040 systemd[1]: Listening on systemd-networkd.socket. Oct 29 01:19:46.778049 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 01:19:46.778059 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 01:19:46.778066 systemd[1]: Listening on systemd-userdbd.socket. Oct 29 01:19:46.778074 systemd[1]: Mounting dev-hugepages.mount... Oct 29 01:19:46.778081 systemd[1]: Mounting dev-mqueue.mount... Oct 29 01:19:46.778088 systemd[1]: Mounting media.mount... Oct 29 01:19:46.778097 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 01:19:46.778106 systemd[1]: Mounting sys-kernel-debug.mount... Oct 29 01:19:46.778113 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 29 01:19:46.778120 systemd[1]: Mounting tmp.mount... Oct 29 01:19:46.778129 systemd[1]: Starting flatcar-tmpfiles.service... Oct 29 01:19:46.778136 systemd[1]: Starting ignition-delete-config.service... Oct 29 01:19:46.778143 systemd[1]: Starting kmod-static-nodes.service... Oct 29 01:19:46.778150 systemd[1]: Starting modprobe@configfs.service... Oct 29 01:19:46.778157 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 01:19:46.778165 systemd[1]: Starting modprobe@drm.service... Oct 29 01:19:46.778172 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 01:19:46.778179 systemd[1]: Starting modprobe@fuse.service... Oct 29 01:19:46.778186 systemd[1]: Starting modprobe@loop.service... Oct 29 01:19:46.778194 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 29 01:19:46.778201 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 29 01:19:46.778208 systemd[1]: Stopped systemd-fsck-root.service. Oct 29 01:19:46.778215 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 29 01:19:46.778235 systemd[1]: Stopped systemd-fsck-usr.service. Oct 29 01:19:46.778246 systemd[1]: Stopped systemd-journald.service. Oct 29 01:19:46.778254 systemd[1]: Starting systemd-journald.service... Oct 29 01:19:46.778263 systemd[1]: Starting systemd-modules-load.service... Oct 29 01:19:46.778271 systemd[1]: Starting systemd-network-generator.service... Oct 29 01:19:46.778278 systemd[1]: Starting systemd-remount-fs.service... Oct 29 01:19:46.778290 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 01:19:46.778298 systemd[1]: verity-setup.service: Deactivated successfully. Oct 29 01:19:46.778304 systemd[1]: Stopped verity-setup.service. Oct 29 01:19:46.778314 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 01:19:46.778323 systemd[1]: Mounted dev-hugepages.mount. Oct 29 01:19:46.778330 systemd[1]: Mounted dev-mqueue.mount. Oct 29 01:19:46.778338 systemd[1]: Mounted media.mount. Oct 29 01:19:46.778348 systemd[1]: Mounted sys-kernel-debug.mount. Oct 29 01:19:46.778355 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 29 01:19:46.778362 systemd[1]: Mounted tmp.mount. Oct 29 01:19:46.778369 systemd[1]: Finished kmod-static-nodes.service. Oct 29 01:19:46.778376 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 01:19:46.778384 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 01:19:46.778391 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 01:19:46.778398 systemd[1]: Finished modprobe@drm.service. Oct 29 01:19:46.778406 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 01:19:46.778413 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 01:19:46.778420 systemd[1]: Finished systemd-network-generator.service. Oct 29 01:19:46.778427 systemd[1]: Finished systemd-remount-fs.service. Oct 29 01:19:46.778437 systemd[1]: Reached target network-pre.target. Oct 29 01:19:46.778458 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 29 01:19:46.778474 systemd[1]: Starting systemd-hwdb-update.service... Oct 29 01:19:46.778487 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 01:19:46.778498 systemd[1]: Starting systemd-random-seed.service... Oct 29 01:19:46.778507 systemd[1]: Finished systemd-modules-load.service. Oct 29 01:19:46.778518 systemd[1]: Starting systemd-sysctl.service... Oct 29 01:19:46.778535 systemd[1]: Finished systemd-random-seed.service. Oct 29 01:19:46.778546 systemd[1]: Reached target first-boot-complete.target. Oct 29 01:19:46.778554 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 29 01:19:46.778561 systemd[1]: Finished modprobe@configfs.service. Oct 29 01:19:46.778569 systemd[1]: Mounting sys-kernel-config.mount... Oct 29 01:19:46.778583 systemd-journald[1019]: Journal started Oct 29 01:19:46.778632 systemd-journald[1019]: Runtime Journal (/run/log/journal/dba66c6757014334b4b6278cc9aa87fe) is 4.8M, max 38.8M, 34.0M free. Oct 29 01:19:43.247000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 29 01:19:43.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 01:19:43.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 01:19:43.373000 audit: BPF prog-id=10 op=LOAD Oct 29 01:19:43.373000 audit: BPF prog-id=10 op=UNLOAD Oct 29 01:19:43.373000 audit: BPF prog-id=11 op=LOAD Oct 29 01:19:43.373000 audit: BPF prog-id=11 op=UNLOAD Oct 29 01:19:43.634000 audit[940]: AVC avc: denied { associate } for pid=940 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 29 01:19:43.634000 audit[940]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d89c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=923 pid=940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:19:43.634000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 01:19:43.636000 audit[940]: AVC avc: denied { associate } for pid=940 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 29 01:19:43.636000 audit[940]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d975 a2=1ed a3=0 items=2 ppid=923 pid=940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:19:43.636000 audit: CWD cwd="/" Oct 29 01:19:43.636000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:43.636000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:43.636000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 01:19:46.588000 audit: BPF prog-id=12 op=LOAD Oct 29 01:19:46.588000 audit: BPF prog-id=3 op=UNLOAD Oct 29 01:19:46.589000 audit: BPF prog-id=13 op=LOAD Oct 29 01:19:46.590000 audit: BPF prog-id=14 op=LOAD Oct 29 01:19:46.590000 audit: BPF prog-id=4 op=UNLOAD Oct 29 01:19:46.590000 audit: BPF prog-id=5 op=UNLOAD Oct 29 01:19:46.592000 audit: BPF prog-id=15 op=LOAD Oct 29 01:19:46.592000 audit: BPF prog-id=12 op=UNLOAD Oct 29 01:19:46.594000 audit: BPF prog-id=16 op=LOAD Oct 29 01:19:46.596000 audit: BPF prog-id=17 op=LOAD Oct 29 01:19:46.596000 audit: BPF prog-id=13 op=UNLOAD Oct 29 01:19:46.596000 audit: BPF prog-id=14 op=UNLOAD Oct 29 01:19:46.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.602000 audit: BPF prog-id=15 op=UNLOAD Oct 29 01:19:46.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.690000 audit: BPF prog-id=18 op=LOAD Oct 29 01:19:46.690000 audit: BPF prog-id=19 op=LOAD Oct 29 01:19:46.690000 audit: BPF prog-id=20 op=LOAD Oct 29 01:19:46.690000 audit: BPF prog-id=16 op=UNLOAD Oct 29 01:19:46.690000 audit: BPF prog-id=17 op=UNLOAD Oct 29 01:19:46.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.773000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 29 01:19:46.773000 audit[1019]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fffb7d41220 a2=4000 a3=7fffb7d412bc items=0 ppid=1 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:19:46.773000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 29 01:19:43.633397 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 01:19:46.589012 systemd[1]: Queued start job for default target multi-user.target. Oct 29 01:19:43.634046 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 01:19:46.589021 systemd[1]: Unnecessary job was removed for dev-sda6.device. Oct 29 01:19:43.634065 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 01:19:46.597859 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 29 01:19:43.634094 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 29 01:19:43.634103 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 29 01:19:43.634132 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 29 01:19:43.634142 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 29 01:19:43.634320 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 29 01:19:43.634355 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 01:19:46.780773 jq[1006]: true Oct 29 01:19:43.634368 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 01:19:43.634897 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 29 01:19:43.634928 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 29 01:19:43.634945 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 29 01:19:43.634958 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 29 01:19:43.634973 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 29 01:19:43.634986 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 29 01:19:46.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.141603 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:46Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 01:19:46.781482 systemd[1]: Started systemd-journald.service. Oct 29 01:19:46.141778 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:46Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 01:19:46.141847 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:46Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 01:19:46.141953 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:46Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 01:19:46.141989 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:46Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 29 01:19:46.782229 systemd[1]: Mounted sys-kernel-config.mount. Oct 29 01:19:46.783802 jq[1048]: true Oct 29 01:19:46.142032 /usr/lib/systemd/system-generators/torcx-generator[940]: time="2025-10-29T01:19:46Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 29 01:19:46.783701 systemd[1]: Starting systemd-journal-flush.service... Oct 29 01:19:46.794661 systemd[1]: Finished systemd-sysctl.service. Oct 29 01:19:46.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.795644 systemd-journald[1019]: Time spent on flushing to /var/log/journal/dba66c6757014334b4b6278cc9aa87fe is 23.020ms for 1991 entries. Oct 29 01:19:46.795644 systemd-journald[1019]: System Journal (/var/log/journal/dba66c6757014334b4b6278cc9aa87fe) is 8.0M, max 584.8M, 576.8M free. Oct 29 01:19:46.842347 systemd-journald[1019]: Received client request to flush runtime journal. Oct 29 01:19:46.842376 kernel: fuse: init (API version 7.34) Oct 29 01:19:46.842389 kernel: loop: module loaded Oct 29 01:19:46.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.811285 systemd[1]: Finished flatcar-tmpfiles.service. Oct 29 01:19:46.812642 systemd[1]: Starting systemd-sysusers.service... Oct 29 01:19:46.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.812938 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 29 01:19:46.813058 systemd[1]: Finished modprobe@fuse.service. Oct 29 01:19:46.814209 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 29 01:19:46.818579 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 29 01:19:46.828018 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 01:19:46.828108 systemd[1]: Finished modprobe@loop.service. Oct 29 01:19:46.828325 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 01:19:46.843035 systemd[1]: Finished systemd-journal-flush.service. Oct 29 01:19:46.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.889760 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 01:19:46.890772 systemd[1]: Starting systemd-udev-settle.service... Oct 29 01:19:46.899427 udevadm[1065]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 29 01:19:46.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:46.943261 systemd[1]: Finished systemd-sysusers.service. Oct 29 01:19:47.137994 ignition[1051]: Ignition 2.14.0 Oct 29 01:19:47.138478 ignition[1051]: deleting config from guestinfo properties Oct 29 01:19:47.195421 ignition[1051]: Successfully deleted config Oct 29 01:19:47.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:47.196123 systemd[1]: Finished ignition-delete-config.service. Oct 29 01:19:47.586501 systemd[1]: Finished systemd-hwdb-update.service. Oct 29 01:19:47.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:47.585000 audit: BPF prog-id=21 op=LOAD Oct 29 01:19:47.585000 audit: BPF prog-id=22 op=LOAD Oct 29 01:19:47.585000 audit: BPF prog-id=7 op=UNLOAD Oct 29 01:19:47.585000 audit: BPF prog-id=8 op=UNLOAD Oct 29 01:19:47.587595 systemd[1]: Starting systemd-udevd.service... Oct 29 01:19:47.600016 systemd-udevd[1070]: Using default interface naming scheme 'v252'. Oct 29 01:19:47.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:47.670000 audit: BPF prog-id=23 op=LOAD Oct 29 01:19:47.670903 systemd[1]: Started systemd-udevd.service. Oct 29 01:19:47.672874 systemd[1]: Starting systemd-networkd.service... Oct 29 01:19:47.678000 audit: BPF prog-id=24 op=LOAD Oct 29 01:19:47.678000 audit: BPF prog-id=25 op=LOAD Oct 29 01:19:47.678000 audit: BPF prog-id=26 op=LOAD Oct 29 01:19:47.680562 systemd[1]: Starting systemd-userdbd.service... Oct 29 01:19:47.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:47.703508 systemd[1]: Started systemd-userdbd.service. Oct 29 01:19:47.718562 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 29 01:19:47.757458 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 29 01:19:47.764459 kernel: ACPI: button: Power Button [PWRF] Oct 29 01:19:47.823465 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Oct 29 01:19:47.842954 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Oct 29 01:19:47.843051 kernel: Guest personality initialized and is active Oct 29 01:19:47.818000 audit[1083]: AVC avc: denied { confidentiality } for pid=1083 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 29 01:19:47.818000 audit[1083]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559145e5ebb0 a1=338ec a2=7f95dd8f3bc5 a3=5 items=110 ppid=1070 pid=1083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:19:47.818000 audit: CWD cwd="/" Oct 29 01:19:47.818000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=1 name=(null) inode=24099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=2 name=(null) inode=24099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=3 name=(null) inode=24100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=4 name=(null) inode=24099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=5 name=(null) inode=24101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=6 name=(null) inode=24099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=7 name=(null) inode=24102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=8 name=(null) inode=24102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=9 name=(null) inode=24103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=10 name=(null) inode=24102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=11 name=(null) inode=24104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=12 name=(null) inode=24102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=13 name=(null) inode=24105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=14 name=(null) inode=24102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=15 name=(null) inode=24106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=16 name=(null) inode=24102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=17 name=(null) inode=24107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=18 name=(null) inode=24099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=19 name=(null) inode=24108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=20 name=(null) inode=24108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=21 name=(null) inode=24109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=22 name=(null) inode=24108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=23 name=(null) inode=24110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=24 name=(null) inode=24108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=25 name=(null) inode=24111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=26 name=(null) inode=24108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=27 name=(null) inode=24112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=28 name=(null) inode=24108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=29 name=(null) inode=24113 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=30 name=(null) inode=24099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=31 name=(null) inode=24114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=32 name=(null) inode=24114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=33 name=(null) inode=24115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=34 name=(null) inode=24114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=35 name=(null) inode=24116 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=36 name=(null) inode=24114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=37 name=(null) inode=24117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=38 name=(null) inode=24114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=39 name=(null) inode=24118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=40 name=(null) inode=24114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=41 name=(null) inode=24119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=42 name=(null) inode=24099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=43 name=(null) inode=24120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=44 name=(null) inode=24120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=45 name=(null) inode=24121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=46 name=(null) inode=24120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=47 name=(null) inode=24122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=48 name=(null) inode=24120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=49 name=(null) inode=24123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=50 name=(null) inode=24120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=51 name=(null) inode=24124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=52 name=(null) inode=24120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=53 name=(null) inode=24125 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=55 name=(null) inode=24126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=56 name=(null) inode=24126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=57 name=(null) inode=24127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=58 name=(null) inode=24126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=59 name=(null) inode=24128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=60 name=(null) inode=24126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=61 name=(null) inode=24129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=62 name=(null) inode=24129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=63 name=(null) inode=24130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=64 name=(null) inode=24129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=65 name=(null) inode=24131 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=66 name=(null) inode=24129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=67 name=(null) inode=24132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=68 name=(null) inode=24129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=69 name=(null) inode=24133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=70 name=(null) inode=24129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=71 name=(null) inode=24134 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=72 name=(null) inode=24126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=73 name=(null) inode=24135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=74 name=(null) inode=24135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=75 name=(null) inode=24136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=76 name=(null) inode=24135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=77 name=(null) inode=24137 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=78 name=(null) inode=24135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=79 name=(null) inode=24138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=80 name=(null) inode=24135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=81 name=(null) inode=24139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=82 name=(null) inode=24135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=83 name=(null) inode=24140 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=84 name=(null) inode=24126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=85 name=(null) inode=24141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=86 name=(null) inode=24141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=87 name=(null) inode=24142 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=88 name=(null) inode=24141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=89 name=(null) inode=24143 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=90 name=(null) inode=24141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=91 name=(null) inode=24144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=92 name=(null) inode=24141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=93 name=(null) inode=24145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=94 name=(null) inode=24141 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=95 name=(null) inode=24146 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=96 name=(null) inode=24126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=97 name=(null) inode=24147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=98 name=(null) inode=24147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=99 name=(null) inode=24148 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=100 name=(null) inode=24147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=101 name=(null) inode=24149 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=102 name=(null) inode=24147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=103 name=(null) inode=24150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=104 name=(null) inode=24147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=105 name=(null) inode=24151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=106 name=(null) inode=24147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=107 name=(null) inode=24152 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PATH item=109 name=(null) inode=24153 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:19:47.818000 audit: PROCTITLE proctitle="(udev-worker)" Oct 29 01:19:47.846733 systemd-networkd[1079]: lo: Link UP Oct 29 01:19:47.846740 systemd-networkd[1079]: lo: Gained carrier Oct 29 01:19:47.847101 systemd-networkd[1079]: Enumeration completed Oct 29 01:19:47.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:47.847183 systemd[1]: Started systemd-networkd.service. Oct 29 01:19:47.847188 systemd-networkd[1079]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Oct 29 01:19:47.849459 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 29 01:19:47.849621 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 29 01:19:47.852051 systemd-networkd[1079]: ens192: Link UP Oct 29 01:19:47.852149 systemd-networkd[1079]: ens192: Gained carrier Oct 29 01:19:47.852469 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Oct 29 01:19:47.862547 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Oct 29 01:19:47.862597 kernel: Initialized host personality Oct 29 01:19:47.866459 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Oct 29 01:19:47.870811 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Oct 29 01:19:47.874464 kernel: mousedev: PS/2 mouse device common for all mice Oct 29 01:19:47.889097 (udev-worker)[1082]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Oct 29 01:19:47.947297 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 01:19:47.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:47.969690 systemd[1]: Finished systemd-udev-settle.service. Oct 29 01:19:47.970633 systemd[1]: Starting lvm2-activation-early.service... Oct 29 01:19:48.028020 lvm[1103]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 01:19:48.054195 systemd[1]: Finished lvm2-activation-early.service. Oct 29 01:19:48.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.054458 systemd[1]: Reached target cryptsetup.target. Oct 29 01:19:48.055755 systemd[1]: Starting lvm2-activation.service... Oct 29 01:19:48.058875 lvm[1104]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 01:19:48.081132 systemd[1]: Finished lvm2-activation.service. Oct 29 01:19:48.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.081361 systemd[1]: Reached target local-fs-pre.target. Oct 29 01:19:48.081491 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 29 01:19:48.081513 systemd[1]: Reached target local-fs.target. Oct 29 01:19:48.081632 systemd[1]: Reached target machines.target. Oct 29 01:19:48.082899 systemd[1]: Starting ldconfig.service... Oct 29 01:19:48.088358 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.088404 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 01:19:48.089738 systemd[1]: Starting systemd-boot-update.service... Oct 29 01:19:48.090580 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 29 01:19:48.091567 systemd[1]: Starting systemd-machine-id-commit.service... Oct 29 01:19:48.092578 systemd[1]: Starting systemd-sysext.service... Oct 29 01:19:48.110160 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1106 (bootctl) Oct 29 01:19:48.110939 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 29 01:19:48.122039 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 29 01:19:48.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.127813 systemd[1]: Unmounting usr-share-oem.mount... Oct 29 01:19:48.142507 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 29 01:19:48.142621 systemd[1]: Unmounted usr-share-oem.mount. Oct 29 01:19:48.177472 kernel: loop0: detected capacity change from 0 to 219144 Oct 29 01:19:48.240345 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 29 01:19:48.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.241020 systemd[1]: Finished systemd-machine-id-commit.service. Oct 29 01:19:48.311526 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 29 01:19:48.375464 kernel: loop1: detected capacity change from 0 to 219144 Oct 29 01:19:48.417537 (sd-sysext)[1118]: Using extensions 'kubernetes'. Oct 29 01:19:48.418018 (sd-sysext)[1118]: Merged extensions into '/usr'. Oct 29 01:19:48.432207 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 01:19:48.434424 systemd-fsck[1115]: fsck.fat 4.2 (2021-01-31) Oct 29 01:19:48.434424 systemd-fsck[1115]: /dev/sda1: 790 files, 120772/258078 clusters Oct 29 01:19:48.435248 systemd[1]: Mounting usr-share-oem.mount... Oct 29 01:19:48.436600 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 01:19:48.439385 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 01:19:48.440277 systemd[1]: Starting modprobe@loop.service... Oct 29 01:19:48.440493 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.440587 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 01:19:48.440676 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 01:19:48.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.442840 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 29 01:19:48.443160 systemd[1]: Mounted usr-share-oem.mount. Oct 29 01:19:48.443501 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 01:19:48.443599 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 01:19:48.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.443917 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 01:19:48.443994 systemd[1]: Finished modprobe@loop.service. Oct 29 01:19:48.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.445456 systemd[1]: Mounting boot.mount... Oct 29 01:19:48.445584 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.445878 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 01:19:48.445956 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 01:19:48.446252 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 01:19:48.447620 systemd[1]: Finished systemd-sysext.service. Oct 29 01:19:48.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.449356 systemd[1]: Starting ensure-sysext.service... Oct 29 01:19:48.450730 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 29 01:19:48.455430 systemd[1]: Reloading. Oct 29 01:19:48.500068 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-10-29T01:19:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 01:19:48.500529 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-10-29T01:19:48Z" level=info msg="torcx already run" Oct 29 01:19:48.555192 systemd-tmpfiles[1126]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 29 01:19:48.563352 systemd-tmpfiles[1126]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 29 01:19:48.565169 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 01:19:48.565183 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 01:19:48.573717 systemd-tmpfiles[1126]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 29 01:19:48.582766 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 01:19:48.634000 audit: BPF prog-id=27 op=LOAD Oct 29 01:19:48.634000 audit: BPF prog-id=28 op=LOAD Oct 29 01:19:48.634000 audit: BPF prog-id=21 op=UNLOAD Oct 29 01:19:48.634000 audit: BPF prog-id=22 op=UNLOAD Oct 29 01:19:48.635000 audit: BPF prog-id=29 op=LOAD Oct 29 01:19:48.635000 audit: BPF prog-id=23 op=UNLOAD Oct 29 01:19:48.636000 audit: BPF prog-id=30 op=LOAD Oct 29 01:19:48.636000 audit: BPF prog-id=18 op=UNLOAD Oct 29 01:19:48.636000 audit: BPF prog-id=31 op=LOAD Oct 29 01:19:48.636000 audit: BPF prog-id=32 op=LOAD Oct 29 01:19:48.636000 audit: BPF prog-id=19 op=UNLOAD Oct 29 01:19:48.636000 audit: BPF prog-id=20 op=UNLOAD Oct 29 01:19:48.636000 audit: BPF prog-id=33 op=LOAD Oct 29 01:19:48.636000 audit: BPF prog-id=24 op=UNLOAD Oct 29 01:19:48.637000 audit: BPF prog-id=34 op=LOAD Oct 29 01:19:48.637000 audit: BPF prog-id=35 op=LOAD Oct 29 01:19:48.637000 audit: BPF prog-id=25 op=UNLOAD Oct 29 01:19:48.637000 audit: BPF prog-id=26 op=UNLOAD Oct 29 01:19:48.642835 systemd[1]: Mounted boot.mount. Oct 29 01:19:48.649611 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 01:19:48.651475 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 01:19:48.652324 systemd[1]: Starting modprobe@loop.service... Oct 29 01:19:48.652484 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.652584 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 01:19:48.653072 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 01:19:48.653153 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 01:19:48.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.653859 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 01:19:48.653943 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 01:19:48.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.654262 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 01:19:48.654339 systemd[1]: Finished modprobe@loop.service. Oct 29 01:19:48.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.654665 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 01:19:48.654733 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.656380 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 01:19:48.657744 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 01:19:48.659312 systemd[1]: Starting modprobe@loop.service... Oct 29 01:19:48.659495 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.659578 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 01:19:48.660055 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 01:19:48.660135 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 01:19:48.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.660463 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 01:19:48.660534 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 01:19:48.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.660820 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 01:19:48.662248 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 01:19:48.662323 systemd[1]: Finished modprobe@loop.service. Oct 29 01:19:48.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.663681 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 01:19:48.664467 systemd[1]: Starting modprobe@drm.service... Oct 29 01:19:48.665379 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 01:19:48.665970 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.666073 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 01:19:48.667587 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 29 01:19:48.668274 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 01:19:48.668367 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 01:19:48.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.668894 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 01:19:48.668972 systemd[1]: Finished modprobe@drm.service. Oct 29 01:19:48.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.669290 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 01:19:48.669375 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 01:19:48.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.669777 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 01:19:48.669840 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 01:19:48.670541 systemd[1]: Finished ensure-sysext.service. Oct 29 01:19:48.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.717992 systemd[1]: Finished systemd-boot-update.service. Oct 29 01:19:48.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.863581 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 29 01:19:48.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.864637 systemd[1]: Starting audit-rules.service... Oct 29 01:19:48.865481 systemd[1]: Starting clean-ca-certificates.service... Oct 29 01:19:48.866285 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 29 01:19:48.865000 audit: BPF prog-id=36 op=LOAD Oct 29 01:19:48.867000 audit: BPF prog-id=37 op=LOAD Oct 29 01:19:48.868527 systemd[1]: Starting systemd-resolved.service... Oct 29 01:19:48.869677 systemd[1]: Starting systemd-timesyncd.service... Oct 29 01:19:48.872021 systemd[1]: Starting systemd-update-utmp.service... Oct 29 01:19:48.882000 audit[1222]: SYSTEM_BOOT pid=1222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.885128 systemd[1]: Finished systemd-update-utmp.service. Oct 29 01:19:48.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.889198 systemd[1]: Finished clean-ca-certificates.service. Oct 29 01:19:48.889348 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 01:19:48.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:19:48.913811 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 29 01:19:48.923739 augenrules[1237]: No rules Oct 29 01:19:48.922000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 29 01:19:48.922000 audit[1237]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffedcac4b90 a2=420 a3=0 items=0 ppid=1217 pid=1237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:19:48.922000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 29 01:19:48.924437 systemd[1]: Finished audit-rules.service. Oct 29 01:19:48.931625 systemd-resolved[1220]: Positive Trust Anchors: Oct 29 01:19:48.931887 systemd-resolved[1220]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 01:19:48.931949 systemd-resolved[1220]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 01:19:48.943141 systemd[1]: Started systemd-timesyncd.service. Oct 29 01:19:48.943353 systemd[1]: Reached target time-set.target. Oct 29 01:19:48.956291 systemd-resolved[1220]: Defaulting to hostname 'linux'. Oct 29 01:19:48.958396 systemd[1]: Started systemd-resolved.service. Oct 29 01:19:48.958558 systemd[1]: Reached target network.target. Oct 29 01:19:48.958650 systemd[1]: Reached target nss-lookup.target. Oct 29 01:21:26.789414 systemd-timesyncd[1221]: Contacted time server 74.208.25.46:123 (0.flatcar.pool.ntp.org). Oct 29 01:21:26.789415 systemd-resolved[1220]: Clock change detected. Flushing caches. Oct 29 01:21:26.789743 systemd-timesyncd[1221]: Initial clock synchronization to Wed 2025-10-29 01:21:26.789311 UTC. Oct 29 01:21:26.884366 ldconfig[1105]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 29 01:21:26.886909 systemd[1]: Finished ldconfig.service. Oct 29 01:21:26.888035 systemd[1]: Starting systemd-update-done.service... Oct 29 01:21:26.892755 systemd[1]: Finished systemd-update-done.service. Oct 29 01:21:26.892938 systemd[1]: Reached target sysinit.target. Oct 29 01:21:26.893127 systemd[1]: Started motdgen.path. Oct 29 01:21:26.893272 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 29 01:21:26.893482 systemd[1]: Started logrotate.timer. Oct 29 01:21:26.893635 systemd[1]: Started mdadm.timer. Oct 29 01:21:26.893732 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 29 01:21:26.893835 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 29 01:21:26.893858 systemd[1]: Reached target paths.target. Oct 29 01:21:26.893947 systemd[1]: Reached target timers.target. Oct 29 01:21:26.894240 systemd[1]: Listening on dbus.socket. Oct 29 01:21:26.895185 systemd[1]: Starting docker.socket... Oct 29 01:21:26.897421 systemd[1]: Listening on sshd.socket. Oct 29 01:21:26.897584 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 01:21:26.897882 systemd[1]: Listening on docker.socket. Oct 29 01:21:26.898018 systemd[1]: Reached target sockets.target. Oct 29 01:21:26.898140 systemd[1]: Reached target basic.target. Oct 29 01:21:26.898252 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 01:21:26.898271 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 01:21:26.899035 systemd[1]: Starting containerd.service... Oct 29 01:21:26.899995 systemd[1]: Starting dbus.service... Oct 29 01:21:26.901338 systemd[1]: Starting enable-oem-cloudinit.service... Oct 29 01:21:26.902721 systemd[1]: Starting extend-filesystems.service... Oct 29 01:21:26.903437 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 29 01:21:26.904520 jq[1248]: false Oct 29 01:21:26.905406 systemd[1]: Starting motdgen.service... Oct 29 01:21:26.906500 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 29 01:21:26.907591 systemd[1]: Starting sshd-keygen.service... Oct 29 01:21:26.910173 systemd[1]: Starting systemd-logind.service... Oct 29 01:21:26.910312 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 01:21:26.930859 jq[1258]: true Oct 29 01:21:26.910373 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 29 01:21:26.911050 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 29 01:21:26.911902 systemd[1]: Starting update-engine.service... Oct 29 01:21:26.931757 jq[1263]: true Oct 29 01:21:26.913655 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 29 01:21:26.932306 extend-filesystems[1249]: Found loop1 Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda1 Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda2 Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda3 Oct 29 01:21:26.932306 extend-filesystems[1249]: Found usr Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda4 Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda6 Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda7 Oct 29 01:21:26.932306 extend-filesystems[1249]: Found sda9 Oct 29 01:21:26.932306 extend-filesystems[1249]: Checking size of /dev/sda9 Oct 29 01:21:26.917102 systemd[1]: Starting vmtoolsd.service... Oct 29 01:21:26.918275 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 29 01:21:26.918401 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 29 01:21:26.918599 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 29 01:21:26.918706 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 29 01:21:26.933305 systemd[1]: Started vmtoolsd.service. Oct 29 01:21:26.933859 systemd[1]: motdgen.service: Deactivated successfully. Oct 29 01:21:26.933962 systemd[1]: Finished motdgen.service. Oct 29 01:21:26.935470 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 01:21:26.935490 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 01:21:26.967009 env[1271]: time="2025-10-29T01:21:26.966973792Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 29 01:21:26.973747 extend-filesystems[1249]: Old size kept for /dev/sda9 Oct 29 01:21:26.973747 extend-filesystems[1249]: Found sr0 Oct 29 01:21:26.972981 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 29 01:21:26.973099 systemd[1]: Finished extend-filesystems.service. Oct 29 01:21:26.991522 systemd-logind[1255]: Watching system buttons on /dev/input/event1 (Power Button) Oct 29 01:21:26.991536 systemd-logind[1255]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 29 01:21:26.991628 systemd-logind[1255]: New seat seat0. Oct 29 01:21:27.010060 env[1271]: time="2025-10-29T01:21:27.010033865Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 29 01:21:27.013884 env[1271]: time="2025-10-29T01:21:27.013299066Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 29 01:21:27.015663 env[1271]: time="2025-10-29T01:21:27.015637972Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 29 01:21:27.015663 env[1271]: time="2025-10-29T01:21:27.015660712Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 29 01:21:27.015916 bash[1287]: Updated "/home/core/.ssh/authorized_keys" Oct 29 01:21:27.016439 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 29 01:21:27.016654 env[1271]: time="2025-10-29T01:21:27.016361960Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 01:21:27.016654 env[1271]: time="2025-10-29T01:21:27.016375280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 29 01:21:27.016654 env[1271]: time="2025-10-29T01:21:27.016384155Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 29 01:21:27.016654 env[1271]: time="2025-10-29T01:21:27.016389810Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 29 01:21:27.016654 env[1271]: time="2025-10-29T01:21:27.016464310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 29 01:21:27.016654 env[1271]: time="2025-10-29T01:21:27.016604379Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 29 01:21:27.016754 env[1271]: time="2025-10-29T01:21:27.016681246Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 01:21:27.016754 env[1271]: time="2025-10-29T01:21:27.016692075Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 29 01:21:27.016754 env[1271]: time="2025-10-29T01:21:27.016719507Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 29 01:21:27.016754 env[1271]: time="2025-10-29T01:21:27.016726450Z" level=info msg="metadata content store policy set" policy=shared Oct 29 01:21:27.019157 env[1271]: time="2025-10-29T01:21:27.019114429Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 29 01:21:27.019157 env[1271]: time="2025-10-29T01:21:27.019147328Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 29 01:21:27.019228 env[1271]: time="2025-10-29T01:21:27.019171335Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 29 01:21:27.019228 env[1271]: time="2025-10-29T01:21:27.019209728Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019271 env[1271]: time="2025-10-29T01:21:27.019226541Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019271 env[1271]: time="2025-10-29T01:21:27.019240944Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019271 env[1271]: time="2025-10-29T01:21:27.019250087Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019271 env[1271]: time="2025-10-29T01:21:27.019261070Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019332 env[1271]: time="2025-10-29T01:21:27.019272226Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019332 env[1271]: time="2025-10-29T01:21:27.019280488Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019332 env[1271]: time="2025-10-29T01:21:27.019288461Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.019332 env[1271]: time="2025-10-29T01:21:27.019300042Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 29 01:21:27.019402 env[1271]: time="2025-10-29T01:21:27.019385421Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 29 01:21:27.020254 env[1271]: time="2025-10-29T01:21:27.020239333Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 29 01:21:27.020460 env[1271]: time="2025-10-29T01:21:27.020444237Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 29 01:21:27.020490 env[1271]: time="2025-10-29T01:21:27.020470961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.020517 env[1271]: time="2025-10-29T01:21:27.020486233Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 29 01:21:27.020733 env[1271]: time="2025-10-29T01:21:27.020718048Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.020765 env[1271]: time="2025-10-29T01:21:27.020735526Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.020765 env[1271]: time="2025-10-29T01:21:27.020747244Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.020765 env[1271]: time="2025-10-29T01:21:27.020760957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.020821 env[1271]: time="2025-10-29T01:21:27.020773848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.020821 env[1271]: time="2025-10-29T01:21:27.020785925Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.021449 env[1271]: time="2025-10-29T01:21:27.021428733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.021482 env[1271]: time="2025-10-29T01:21:27.021451617Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.021482 env[1271]: time="2025-10-29T01:21:27.021468848Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 29 01:21:27.022015 env[1271]: time="2025-10-29T01:21:27.021997929Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.022052 env[1271]: time="2025-10-29T01:21:27.022018039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.022052 env[1271]: time="2025-10-29T01:21:27.022031784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.022052 env[1271]: time="2025-10-29T01:21:27.022044249Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 29 01:21:27.024060 env[1271]: time="2025-10-29T01:21:27.023559980Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 29 01:21:27.024060 env[1271]: time="2025-10-29T01:21:27.023575259Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 29 01:21:27.024060 env[1271]: time="2025-10-29T01:21:27.023590124Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 29 01:21:27.024060 env[1271]: time="2025-10-29T01:21:27.023614969Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 29 01:21:27.024472 env[1271]: time="2025-10-29T01:21:27.024423415Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 29 01:21:27.027562 env[1271]: time="2025-10-29T01:21:27.024486166Z" level=info msg="Connect containerd service" Oct 29 01:21:27.027562 env[1271]: time="2025-10-29T01:21:27.024538688Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 29 01:21:27.027562 env[1271]: time="2025-10-29T01:21:27.024890430Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 01:21:27.027562 env[1271]: time="2025-10-29T01:21:27.026096281Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 29 01:21:27.027562 env[1271]: time="2025-10-29T01:21:27.026134829Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 29 01:21:27.027562 env[1271]: time="2025-10-29T01:21:27.026170350Z" level=info msg="containerd successfully booted in 0.059624s" Oct 29 01:21:27.026221 systemd[1]: Started containerd.service. Oct 29 01:21:27.027723 env[1271]: time="2025-10-29T01:21:27.027604320Z" level=info msg="Start subscribing containerd event" Oct 29 01:21:27.027723 env[1271]: time="2025-10-29T01:21:27.027628746Z" level=info msg="Start recovering state" Oct 29 01:21:27.027723 env[1271]: time="2025-10-29T01:21:27.027686201Z" level=info msg="Start event monitor" Oct 29 01:21:27.027723 env[1271]: time="2025-10-29T01:21:27.027701384Z" level=info msg="Start snapshots syncer" Oct 29 01:21:27.027723 env[1271]: time="2025-10-29T01:21:27.027717365Z" level=info msg="Start cni network conf syncer for default" Oct 29 01:21:27.027803 env[1271]: time="2025-10-29T01:21:27.027726105Z" level=info msg="Start streaming server" Oct 29 01:21:27.035546 dbus-daemon[1247]: [system] SELinux support is enabled Oct 29 01:21:27.037487 dbus-daemon[1247]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 29 01:21:27.035655 systemd[1]: Started dbus.service. Oct 29 01:21:27.037086 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 29 01:21:27.037103 systemd[1]: Reached target system-config.target. Oct 29 01:21:27.037224 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 29 01:21:27.037234 systemd[1]: Reached target user-config.target. Oct 29 01:21:27.037346 systemd[1]: Started systemd-logind.service. Oct 29 01:21:27.051078 kernel: NET: Registered PF_VSOCK protocol family Oct 29 01:21:27.061281 update_engine[1257]: I1029 01:21:27.060529 1257 main.cc:92] Flatcar Update Engine starting Oct 29 01:21:27.063147 systemd[1]: Started update-engine.service. Oct 29 01:21:27.064842 systemd[1]: Started locksmithd.service. Oct 29 01:21:27.065444 update_engine[1257]: I1029 01:21:27.065380 1257 update_check_scheduler.cc:74] Next update check in 9m14s Oct 29 01:21:27.342389 locksmithd[1306]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 29 01:21:27.517113 sshd_keygen[1288]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 29 01:21:27.531223 systemd[1]: Finished sshd-keygen.service. Oct 29 01:21:27.532545 systemd[1]: Starting issuegen.service... Oct 29 01:21:27.536109 systemd[1]: issuegen.service: Deactivated successfully. Oct 29 01:21:27.536219 systemd[1]: Finished issuegen.service. Oct 29 01:21:27.537426 systemd[1]: Starting systemd-user-sessions.service... Oct 29 01:21:27.544727 systemd[1]: Finished systemd-user-sessions.service. Oct 29 01:21:27.545802 systemd[1]: Started getty@tty1.service. Oct 29 01:21:27.547115 systemd[1]: Started serial-getty@ttyS0.service. Oct 29 01:21:27.547363 systemd[1]: Reached target getty.target. Oct 29 01:21:27.596287 systemd-networkd[1079]: ens192: Gained IPv6LL Oct 29 01:21:27.597687 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 29 01:21:27.598039 systemd[1]: Reached target network-online.target. Oct 29 01:21:27.599511 systemd[1]: Starting kubelet.service... Oct 29 01:21:31.144771 systemd[1]: Started kubelet.service. Oct 29 01:21:31.145109 systemd[1]: Reached target multi-user.target. Oct 29 01:21:31.146040 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 29 01:21:31.150751 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 29 01:21:31.150872 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 29 01:21:31.151082 systemd[1]: Startup finished in 991ms (kernel) + 7.493s (initrd) + 10.304s (userspace) = 18.790s. Oct 29 01:21:31.241471 login[1369]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 29 01:21:31.241579 login[1368]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 29 01:21:31.286863 systemd[1]: Created slice user-500.slice. Oct 29 01:21:31.287895 systemd[1]: Starting user-runtime-dir@500.service... Oct 29 01:21:31.289498 systemd-logind[1255]: New session 2 of user core. Oct 29 01:21:31.291590 systemd-logind[1255]: New session 1 of user core. Oct 29 01:21:31.311058 systemd[1]: Finished user-runtime-dir@500.service. Oct 29 01:21:31.312295 systemd[1]: Starting user@500.service... Oct 29 01:21:31.325720 (systemd)[1377]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:31.500207 systemd[1377]: Queued start job for default target default.target. Oct 29 01:21:31.500847 systemd[1377]: Reached target paths.target. Oct 29 01:21:31.500863 systemd[1377]: Reached target sockets.target. Oct 29 01:21:31.500873 systemd[1377]: Reached target timers.target. Oct 29 01:21:31.500882 systemd[1377]: Reached target basic.target. Oct 29 01:21:31.500950 systemd[1]: Started user@500.service. Oct 29 01:21:31.501733 systemd[1]: Started session-1.scope. Oct 29 01:21:31.501836 systemd[1377]: Reached target default.target. Oct 29 01:21:31.501866 systemd[1377]: Startup finished in 172ms. Oct 29 01:21:31.502289 systemd[1]: Started session-2.scope. Oct 29 01:21:32.742667 kubelet[1374]: E1029 01:21:32.742630 1374 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 01:21:32.743635 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 01:21:32.743717 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 01:21:42.993296 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 29 01:21:42.993454 systemd[1]: Stopped kubelet.service. Oct 29 01:21:42.994691 systemd[1]: Starting kubelet.service... Oct 29 01:21:43.310124 systemd[1]: Started kubelet.service. Oct 29 01:21:43.345736 kubelet[1406]: E1029 01:21:43.345703 1406 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 01:21:43.347724 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 01:21:43.347800 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 01:21:53.493220 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 29 01:21:53.493352 systemd[1]: Stopped kubelet.service. Oct 29 01:21:53.494414 systemd[1]: Starting kubelet.service... Oct 29 01:21:53.781996 systemd[1]: Started kubelet.service. Oct 29 01:21:53.812639 kubelet[1416]: E1029 01:21:53.812602 1416 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 01:21:53.813860 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 01:21:53.813935 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 01:21:57.216517 systemd[1]: Created slice system-sshd.slice. Oct 29 01:21:57.218097 systemd[1]: Started sshd@0-139.178.70.102:22-139.178.68.195:59592.service. Oct 29 01:21:57.264485 sshd[1422]: Accepted publickey for core from 139.178.68.195 port 59592 ssh2: RSA SHA256:dX9xZ5mtK3eVY9XPNyM7eUHC3/BhNnXhscR3rJLIlYA Oct 29 01:21:57.265265 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:57.268502 systemd[1]: Started session-3.scope. Oct 29 01:21:57.268741 systemd-logind[1255]: New session 3 of user core. Oct 29 01:21:57.317494 systemd[1]: Started sshd@1-139.178.70.102:22-139.178.68.195:59594.service. Oct 29 01:21:57.351606 sshd[1427]: Accepted publickey for core from 139.178.68.195 port 59594 ssh2: RSA SHA256:dX9xZ5mtK3eVY9XPNyM7eUHC3/BhNnXhscR3rJLIlYA Oct 29 01:21:57.352471 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:57.355535 systemd[1]: Started session-4.scope. Oct 29 01:21:57.355738 systemd-logind[1255]: New session 4 of user core. Oct 29 01:21:57.406627 sshd[1427]: pam_unix(sshd:session): session closed for user core Oct 29 01:21:57.408624 systemd[1]: Started sshd@2-139.178.70.102:22-139.178.68.195:59598.service. Oct 29 01:21:57.410230 systemd-logind[1255]: Session 4 logged out. Waiting for processes to exit. Oct 29 01:21:57.410350 systemd[1]: sshd@1-139.178.70.102:22-139.178.68.195:59594.service: Deactivated successfully. Oct 29 01:21:57.410741 systemd[1]: session-4.scope: Deactivated successfully. Oct 29 01:21:57.411287 systemd-logind[1255]: Removed session 4. Oct 29 01:21:57.443452 sshd[1432]: Accepted publickey for core from 139.178.68.195 port 59598 ssh2: RSA SHA256:dX9xZ5mtK3eVY9XPNyM7eUHC3/BhNnXhscR3rJLIlYA Oct 29 01:21:57.444474 sshd[1432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:57.446942 systemd-logind[1255]: New session 5 of user core. Oct 29 01:21:57.447398 systemd[1]: Started session-5.scope. Oct 29 01:21:57.495298 sshd[1432]: pam_unix(sshd:session): session closed for user core Oct 29 01:21:57.497271 systemd[1]: sshd@2-139.178.70.102:22-139.178.68.195:59598.service: Deactivated successfully. Oct 29 01:21:57.497640 systemd[1]: session-5.scope: Deactivated successfully. Oct 29 01:21:57.498224 systemd-logind[1255]: Session 5 logged out. Waiting for processes to exit. Oct 29 01:21:57.499006 systemd[1]: Started sshd@3-139.178.70.102:22-139.178.68.195:59604.service. Oct 29 01:21:57.499522 systemd-logind[1255]: Removed session 5. Oct 29 01:21:57.533841 sshd[1439]: Accepted publickey for core from 139.178.68.195 port 59604 ssh2: RSA SHA256:dX9xZ5mtK3eVY9XPNyM7eUHC3/BhNnXhscR3rJLIlYA Oct 29 01:21:57.534634 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:57.537639 systemd[1]: Started session-6.scope. Oct 29 01:21:57.537840 systemd-logind[1255]: New session 6 of user core. Oct 29 01:21:57.588811 sshd[1439]: pam_unix(sshd:session): session closed for user core Oct 29 01:21:57.592092 systemd[1]: Started sshd@4-139.178.70.102:22-139.178.68.195:59618.service. Oct 29 01:21:57.593535 systemd-logind[1255]: Session 6 logged out. Waiting for processes to exit. Oct 29 01:21:57.593642 systemd[1]: sshd@3-139.178.70.102:22-139.178.68.195:59604.service: Deactivated successfully. Oct 29 01:21:57.594217 systemd[1]: session-6.scope: Deactivated successfully. Oct 29 01:21:57.594851 systemd-logind[1255]: Removed session 6. Oct 29 01:21:57.631439 sshd[1444]: Accepted publickey for core from 139.178.68.195 port 59618 ssh2: RSA SHA256:dX9xZ5mtK3eVY9XPNyM7eUHC3/BhNnXhscR3rJLIlYA Oct 29 01:21:57.632561 sshd[1444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:57.635373 systemd-logind[1255]: New session 7 of user core. Oct 29 01:21:57.635911 systemd[1]: Started session-7.scope. Oct 29 01:21:57.695854 sudo[1448]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 29 01:21:57.696011 sudo[1448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 01:21:57.701193 dbus-daemon[1247]: \xd0-\xc4Q\xf9U: received setenforce notice (enforcing=464591232) Oct 29 01:21:57.702189 sudo[1448]: pam_unix(sudo:session): session closed for user root Oct 29 01:21:57.704016 sshd[1444]: pam_unix(sshd:session): session closed for user core Oct 29 01:21:57.706144 systemd[1]: sshd@4-139.178.70.102:22-139.178.68.195:59618.service: Deactivated successfully. Oct 29 01:21:57.706459 systemd[1]: session-7.scope: Deactivated successfully. Oct 29 01:21:57.706917 systemd-logind[1255]: Session 7 logged out. Waiting for processes to exit. Oct 29 01:21:57.707789 systemd[1]: Started sshd@5-139.178.70.102:22-139.178.68.195:59632.service. Oct 29 01:21:57.708460 systemd-logind[1255]: Removed session 7. Oct 29 01:21:57.741914 sshd[1452]: Accepted publickey for core from 139.178.68.195 port 59632 ssh2: RSA SHA256:dX9xZ5mtK3eVY9XPNyM7eUHC3/BhNnXhscR3rJLIlYA Oct 29 01:21:57.742891 sshd[1452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:57.746224 systemd-logind[1255]: New session 8 of user core. Oct 29 01:21:57.746744 systemd[1]: Started session-8.scope. Oct 29 01:21:57.799287 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 29 01:21:57.799475 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 01:21:57.801549 sudo[1456]: pam_unix(sudo:session): session closed for user root Oct 29 01:21:57.805152 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 29 01:21:57.805508 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 01:21:57.812483 systemd[1]: Stopping audit-rules.service... Oct 29 01:21:57.819844 kernel: kauditd_printk_skb: 230 callbacks suppressed Oct 29 01:21:57.819910 kernel: audit: type=1305 audit(1761700917.812:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 01:21:57.812000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 01:21:57.813869 systemd[1]: audit-rules.service: Deactivated successfully. Oct 29 01:21:57.820087 auditctl[1459]: No rules Oct 29 01:21:57.813985 systemd[1]: Stopped audit-rules.service. Oct 29 01:21:57.815543 systemd[1]: Starting audit-rules.service... Oct 29 01:21:57.812000 audit[1459]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe277348d0 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:21:57.812000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 29 01:21:57.827023 kernel: audit: type=1300 audit(1761700917.812:209): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe277348d0 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:21:57.827088 kernel: audit: type=1327 audit(1761700917.812:209): proctitle=2F7362696E2F617564697463746C002D44 Oct 29 01:21:57.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.831079 kernel: audit: type=1131 audit(1761700917.812:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.831501 augenrules[1476]: No rules Oct 29 01:21:57.831996 systemd[1]: Finished audit-rules.service. Oct 29 01:21:57.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.831000 audit[1455]: USER_END pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.832518 sudo[1455]: pam_unix(sudo:session): session closed for user root Oct 29 01:21:57.838275 kernel: audit: type=1130 audit(1761700917.831:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.841022 kernel: audit: type=1106 audit(1761700917.831:212): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.841048 kernel: audit: type=1104 audit(1761700917.831:213): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.831000 audit[1455]: CRED_DISP pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.840497 systemd[1]: Started sshd@6-139.178.70.102:22-139.178.68.195:59648.service. Oct 29 01:21:57.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.102:22-139.178.68.195:59648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.838427 sshd[1452]: pam_unix(sshd:session): session closed for user core Oct 29 01:21:57.844042 kernel: audit: type=1130 audit(1761700917.837:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.102:22-139.178.68.195:59648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.844000 audit[1452]: USER_END pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.846091 systemd[1]: sshd@5-139.178.70.102:22-139.178.68.195:59632.service: Deactivated successfully. Oct 29 01:21:57.846532 systemd[1]: session-8.scope: Deactivated successfully. Oct 29 01:21:57.844000 audit[1452]: CRED_DISP pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.850387 systemd-logind[1255]: Session 8 logged out. Waiting for processes to exit. Oct 29 01:21:57.850994 systemd-logind[1255]: Removed session 8. Oct 29 01:21:57.852728 kernel: audit: type=1106 audit(1761700917.844:215): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.852789 kernel: audit: type=1104 audit(1761700917.844:216): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.102:22-139.178.68.195:59632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.879000 audit[1481]: USER_ACCT pid=1481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.880613 sshd[1481]: Accepted publickey for core from 139.178.68.195 port 59648 ssh2: RSA SHA256:dX9xZ5mtK3eVY9XPNyM7eUHC3/BhNnXhscR3rJLIlYA Oct 29 01:21:57.880000 audit[1481]: CRED_ACQ pid=1481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.880000 audit[1481]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad601ba0 a2=3 a3=0 items=0 ppid=1 pid=1481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:21:57.880000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 01:21:57.881481 sshd[1481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 01:21:57.884565 systemd[1]: Started session-9.scope. Oct 29 01:21:57.884809 systemd-logind[1255]: New session 9 of user core. Oct 29 01:21:57.887000 audit[1481]: USER_START pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.887000 audit[1484]: CRED_ACQ pid=1484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:21:57.935948 sudo[1485]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 29 01:21:57.934000 audit[1485]: USER_ACCT pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.934000 audit[1485]: CRED_REFR pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.936141 sudo[1485]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 01:21:57.936000 audit[1485]: USER_START pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.943719 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Oct 29 01:21:57.946177 systemd[1]: Starting coreos-metadata.service... Oct 29 01:21:57.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:57.984216 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 29 01:21:57.984325 systemd[1]: Finished coreos-metadata.service. Oct 29 01:21:58.769378 systemd[1]: Stopped kubelet.service. Oct 29 01:21:58.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:58.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:58.771306 systemd[1]: Starting kubelet.service... Oct 29 01:21:58.791821 systemd[1]: Reloading. Oct 29 01:21:58.847967 /usr/lib/systemd/system-generators/torcx-generator[1547]: time="2025-10-29T01:21:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 01:21:58.847987 /usr/lib/systemd/system-generators/torcx-generator[1547]: time="2025-10-29T01:21:58Z" level=info msg="torcx already run" Oct 29 01:21:58.909516 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 01:21:58.909528 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 01:21:58.920917 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit: BPF prog-id=43 op=LOAD Oct 29 01:21:58.959000 audit: BPF prog-id=38 op=UNLOAD Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit: BPF prog-id=44 op=LOAD Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit: BPF prog-id=45 op=LOAD Oct 29 01:21:58.959000 audit: BPF prog-id=39 op=UNLOAD Oct 29 01:21:58.959000 audit: BPF prog-id=40 op=UNLOAD Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.959000 audit: BPF prog-id=46 op=LOAD Oct 29 01:21:58.959000 audit: BPF prog-id=37 op=UNLOAD Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit: BPF prog-id=47 op=LOAD Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.960000 audit: BPF prog-id=48 op=LOAD Oct 29 01:21:58.960000 audit: BPF prog-id=27 op=UNLOAD Oct 29 01:21:58.960000 audit: BPF prog-id=28 op=UNLOAD Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.961000 audit: BPF prog-id=49 op=LOAD Oct 29 01:21:58.961000 audit: BPF prog-id=36 op=UNLOAD Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit: BPF prog-id=50 op=LOAD Oct 29 01:21:58.962000 audit: BPF prog-id=29 op=UNLOAD Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit: BPF prog-id=51 op=LOAD Oct 29 01:21:58.962000 audit: BPF prog-id=30 op=UNLOAD Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit: BPF prog-id=52 op=LOAD Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.962000 audit: BPF prog-id=53 op=LOAD Oct 29 01:21:58.962000 audit: BPF prog-id=31 op=UNLOAD Oct 29 01:21:58.962000 audit: BPF prog-id=32 op=UNLOAD Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit: BPF prog-id=54 op=LOAD Oct 29 01:21:58.963000 audit: BPF prog-id=41 op=UNLOAD Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit: BPF prog-id=55 op=LOAD Oct 29 01:21:58.964000 audit: BPF prog-id=33 op=UNLOAD Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit: BPF prog-id=56 op=LOAD Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:21:58.964000 audit: BPF prog-id=57 op=LOAD Oct 29 01:21:58.964000 audit: BPF prog-id=34 op=UNLOAD Oct 29 01:21:58.964000 audit: BPF prog-id=35 op=UNLOAD Oct 29 01:21:58.973801 systemd[1]: Started kubelet.service. Oct 29 01:21:58.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:58.974860 systemd[1]: Stopping kubelet.service... Oct 29 01:21:58.975533 systemd[1]: kubelet.service: Deactivated successfully. Oct 29 01:21:58.975709 systemd[1]: Stopped kubelet.service. Oct 29 01:21:58.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:58.978274 systemd[1]: Starting kubelet.service... Oct 29 01:21:59.643199 systemd[1]: Started kubelet.service. Oct 29 01:21:59.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:21:59.680459 kubelet[1614]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 29 01:21:59.680459 kubelet[1614]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 01:21:59.680713 kubelet[1614]: I1029 01:21:59.680494 1614 server.go:213] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 29 01:22:00.149118 kubelet[1614]: I1029 01:22:00.149060 1614 server.go:529] "Kubelet version" kubeletVersion="v1.34.1" Oct 29 01:22:00.149225 kubelet[1614]: I1029 01:22:00.149217 1614 server.go:531] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 29 01:22:00.162390 kubelet[1614]: I1029 01:22:00.162365 1614 watchdog_linux.go:95] "Systemd watchdog is not enabled" Oct 29 01:22:00.162523 kubelet[1614]: I1029 01:22:00.162513 1614 watchdog_linux.go:137] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 29 01:22:00.162790 kubelet[1614]: I1029 01:22:00.162780 1614 server.go:956] "Client rotation is on, will bootstrap in background" Oct 29 01:22:00.165686 kubelet[1614]: I1029 01:22:00.165671 1614 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 29 01:22:00.171660 kubelet[1614]: E1029 01:22:00.171632 1614 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 29 01:22:00.171814 kubelet[1614]: I1029 01:22:00.171681 1614 server.go:1400] "CRI implementation should be updated to support RuntimeConfig. Falling back to using cgroupDriver from kubelet config." Oct 29 01:22:00.179650 kubelet[1614]: I1029 01:22:00.179635 1614 server.go:781] "--cgroups-per-qos enabled, but --cgroup-root was not specified. Defaulting to /" Oct 29 01:22:00.184268 kubelet[1614]: I1029 01:22:00.184237 1614 container_manager_linux.go:270] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 29 01:22:00.184471 kubelet[1614]: I1029 01:22:00.184350 1614 container_manager_linux.go:275] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.134","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 29 01:22:00.184591 kubelet[1614]: I1029 01:22:00.184580 1614 topology_manager.go:138] "Creating topology manager with none policy" Oct 29 01:22:00.184639 kubelet[1614]: I1029 01:22:00.184632 1614 container_manager_linux.go:306] "Creating device plugin manager" Oct 29 01:22:00.184746 kubelet[1614]: I1029 01:22:00.184738 1614 container_manager_linux.go:315] "Creating Dynamic Resource Allocation (DRA) manager" Oct 29 01:22:00.190037 kubelet[1614]: I1029 01:22:00.190020 1614 state_mem.go:36] "Initialized new in-memory state store" Oct 29 01:22:00.194798 kubelet[1614]: I1029 01:22:00.194787 1614 kubelet.go:475] "Attempting to sync node with API server" Oct 29 01:22:00.194866 kubelet[1614]: I1029 01:22:00.194858 1614 kubelet.go:376] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 29 01:22:00.194922 kubelet[1614]: I1029 01:22:00.194915 1614 kubelet.go:387] "Adding apiserver pod source" Oct 29 01:22:00.194977 kubelet[1614]: I1029 01:22:00.194970 1614 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 29 01:22:00.195201 kubelet[1614]: E1029 01:22:00.195081 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:00.195269 kubelet[1614]: E1029 01:22:00.195127 1614 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:00.200227 kubelet[1614]: I1029 01:22:00.200218 1614 kuberuntime_manager.go:291] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 29 01:22:00.200540 kubelet[1614]: I1029 01:22:00.200531 1614 kubelet.go:940] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 29 01:22:00.200601 kubelet[1614]: I1029 01:22:00.200593 1614 kubelet.go:964] "Not starting PodCertificateRequest manager because we are in static kubelet mode or the PodCertificateProjection feature gate is disabled" Oct 29 01:22:00.200664 kubelet[1614]: W1029 01:22:00.200657 1614 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 29 01:22:00.201878 kubelet[1614]: I1029 01:22:00.201869 1614 server.go:1262] "Started kubelet" Oct 29 01:22:00.201000 audit[1614]: AVC avc: denied { mac_admin } for pid=1614 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:00.201000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 01:22:00.201000 audit[1614]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bfec60 a1=c000a79188 a2=c000bfec30 a3=25 items=0 ppid=1 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.201000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 01:22:00.202593 kubelet[1614]: I1029 01:22:00.202577 1614 kubelet.go:1567] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 29 01:22:00.201000 audit[1614]: AVC avc: denied { mac_admin } for pid=1614 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:00.201000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 01:22:00.201000 audit[1614]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004680e0 a1=c000a791a0 a2=c000bfecf0 a3=25 items=0 ppid=1 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.201000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 01:22:00.202805 kubelet[1614]: I1029 01:22:00.202795 1614 kubelet.go:1571] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 29 01:22:00.202922 kubelet[1614]: I1029 01:22:00.202914 1614 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 29 01:22:00.215717 kubelet[1614]: I1029 01:22:00.215684 1614 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 29 01:22:00.216365 kubelet[1614]: I1029 01:22:00.216354 1614 server.go:310] "Adding debug handlers to kubelet server" Oct 29 01:22:00.218150 kubelet[1614]: I1029 01:22:00.218128 1614 ratelimit.go:56] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 29 01:22:00.218221 kubelet[1614]: I1029 01:22:00.218209 1614 server_v1.go:49] "podresources" method="list" useActivePods=true Oct 29 01:22:00.218351 kubelet[1614]: I1029 01:22:00.218343 1614 server.go:249] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 29 01:22:00.218548 kubelet[1614]: I1029 01:22:00.218539 1614 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 29 01:22:00.220435 kubelet[1614]: I1029 01:22:00.220331 1614 volume_manager.go:313] "Starting Kubelet Volume Manager" Oct 29 01:22:00.220491 kubelet[1614]: E1029 01:22:00.220476 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:00.220793 kubelet[1614]: I1029 01:22:00.220780 1614 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Oct 29 01:22:00.220820 kubelet[1614]: I1029 01:22:00.220809 1614 reconciler.go:29] "Reconciler: start to sync state" Oct 29 01:22:00.221315 kubelet[1614]: E1029 01:22:00.221298 1614 reflector.go:205] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 29 01:22:00.221393 kubelet[1614]: E1029 01:22:00.221379 1614 reflector.go:205] "Failed to watch" err="failed to list *v1.Node: nodes \"10.67.124.134\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 29 01:22:00.224031 kubelet[1614]: I1029 01:22:00.223963 1614 factory.go:223] Registration of the containerd container factory successfully Oct 29 01:22:00.224031 kubelet[1614]: I1029 01:22:00.223973 1614 factory.go:223] Registration of the systemd container factory successfully Oct 29 01:22:00.224031 kubelet[1614]: I1029 01:22:00.224027 1614 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 29 01:22:00.236069 kubelet[1614]: E1029 01:22:00.235278 1614 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.134\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 29 01:22:00.236069 kubelet[1614]: E1029 01:22:00.235361 1614 reflector.go:205] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 29 01:22:00.236380 kubelet[1614]: I1029 01:22:00.236372 1614 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 29 01:22:00.236425 kubelet[1614]: I1029 01:22:00.236417 1614 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 29 01:22:00.236925 kubelet[1614]: I1029 01:22:00.236917 1614 state_mem.go:36] "Initialized new in-memory state store" Oct 29 01:22:00.240275 kubelet[1614]: I1029 01:22:00.240267 1614 policy_none.go:49] "None policy: Start" Oct 29 01:22:00.240348 kubelet[1614]: I1029 01:22:00.240340 1614 memory_manager.go:187] "Starting memorymanager" policy="None" Oct 29 01:22:00.240397 kubelet[1614]: I1029 01:22:00.240389 1614 state_mem.go:36] "Initializing new in-memory state store" logger="Memory Manager state checkpoint" Oct 29 01:22:00.243591 kubelet[1614]: I1029 01:22:00.243583 1614 policy_none.go:47] "Start" Oct 29 01:22:00.246603 kubelet[1614]: E1029 01:22:00.245056 1614 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a72d1c3183 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.201851267 +0000 UTC m=+0.554145031,LastTimestamp:2025-10-29 01:22:00.201851267 +0000 UTC m=+0.554145031,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.247411 systemd[1]: Created slice kubepods.slice. Oct 29 01:22:00.249944 kubelet[1614]: E1029 01:22:00.249651 1614 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a72f1847b5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.134 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.235149237 +0000 UTC m=+0.587442996,LastTimestamp:2025-10-29 01:22:00.235149237 +0000 UTC m=+0.587442996,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.256402 systemd[1]: Created slice kubepods-burstable.slice. Oct 29 01:22:00.262160 kubelet[1614]: E1029 01:22:00.259594 1614 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a72f185e2f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.134 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.235154991 +0000 UTC m=+0.587448749,LastTimestamp:2025-10-29 01:22:00.235154991 +0000 UTC m=+0.587448749,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.261264 systemd[1]: Created slice kubepods-besteffort.slice. Oct 29 01:22:00.271509 kubelet[1614]: E1029 01:22:00.271441 1614 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a72f1866f1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.134 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.235157233 +0000 UTC m=+0.587450991,LastTimestamp:2025-10-29 01:22:00.235157233 +0000 UTC m=+0.587450991,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.274621 kubelet[1614]: E1029 01:22:00.274606 1614 manager.go:513] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 29 01:22:00.273000 audit[1614]: AVC avc: denied { mac_admin } for pid=1614 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:00.273000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 01:22:00.273000 audit[1614]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea5110 a1=c000ecf068 a2=c000ea50e0 a3=25 items=0 ppid=1 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 01:22:00.274868 kubelet[1614]: E1029 01:22:00.274856 1614 server.go:96] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 29 01:22:00.274975 kubelet[1614]: I1029 01:22:00.274967 1614 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 29 01:22:00.275030 kubelet[1614]: I1029 01:22:00.275011 1614 container_log_manager.go:146] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 29 01:22:00.274000 audit[1636]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.274000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc23af7c0 a2=0 a3=7fffc23af7ac items=0 ppid=1614 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 01:22:00.275755 kubelet[1614]: I1029 01:22:00.275748 1614 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 29 01:22:00.277088 kubelet[1614]: E1029 01:22:00.277078 1614 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 29 01:22:00.277172 kubelet[1614]: E1029 01:22:00.277164 1614 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.134\" not found" Oct 29 01:22:00.276000 audit[1637]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.276000 audit[1637]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcbf528730 a2=0 a3=7ffcbf52871c items=0 ppid=1614 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 01:22:00.278537 kubelet[1614]: E1029 01:22:00.278493 1614 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.134.1872d1a72f1847b5\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a72f1847b5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.134 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.235149237 +0000 UTC m=+0.587442996,LastTimestamp:2025-10-29 01:22:00.237431707 +0000 UTC m=+0.589725465,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.281913 kubelet[1614]: E1029 01:22:00.281865 1614 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.134.1872d1a72f185e2f\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a72f185e2f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.134 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.235154991 +0000 UTC m=+0.587448749,LastTimestamp:2025-10-29 01:22:00.237435367 +0000 UTC m=+0.589729131,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.285366 kubelet[1614]: E1029 01:22:00.285300 1614 event.go:359] "Server rejected event (will not retry!)" err="events \"10.67.124.134.1872d1a72f1866f1\" is forbidden: User \"system:anonymous\" cannot patch resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a72f1866f1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.134 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.235157233 +0000 UTC m=+0.587450991,LastTimestamp:2025-10-29 01:22:00.237437405 +0000 UTC m=+0.589731163,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.289017 kubelet[1614]: E1029 01:22:00.288960 1614 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.134.1872d1a7318e7c0d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.134,UID:10.67.124.134,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.134,},FirstTimestamp:2025-10-29 01:22:00.276450317 +0000 UTC m=+0.628744078,LastTimestamp:2025-10-29 01:22:00.276450317 +0000 UTC m=+0.628744078,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.134,}" Oct 29 01:22:00.278000 audit[1639]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.278000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff118f2a80 a2=0 a3=7fff118f2a6c items=0 ppid=1614 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 01:22:00.295000 audit[1644]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.295000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffffdb1e80 a2=0 a3=7fffffdb1e6c items=0 ppid=1614 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 01:22:00.375978 kubelet[1614]: I1029 01:22:00.375949 1614 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.134" Oct 29 01:22:00.386000 audit[1649]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.386000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffef5a60120 a2=0 a3=7ffef5a6010c items=0 ppid=1614 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.387513 kubelet[1614]: I1029 01:22:00.387325 1614 kubelet_node_status.go:78] "Successfully registered node" node="10.67.124.134" Oct 29 01:22:00.387513 kubelet[1614]: E1029 01:22:00.387360 1614 kubelet_node_status.go:486] "Error updating node status, will retry" err="error getting node \"10.67.124.134\": node \"10.67.124.134\" not found" Oct 29 01:22:00.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F380000002D2D737263003132372E Oct 29 01:22:00.387793 kubelet[1614]: I1029 01:22:00.387767 1614 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv4" Oct 29 01:22:00.387000 audit[1650]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.387000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbd140e30 a2=0 a3=7ffdbd140e1c items=0 ppid=1614 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 01:22:00.387000 audit[1651]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:00.387000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6c1c6b70 a2=0 a3=10e3 items=0 ppid=1614 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 01:22:00.388753 kubelet[1614]: I1029 01:22:00.388731 1614 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv6" Oct 29 01:22:00.388826 kubelet[1614]: I1029 01:22:00.388818 1614 status_manager.go:244] "Starting to sync pod status with apiserver" Oct 29 01:22:00.388890 kubelet[1614]: I1029 01:22:00.388882 1614 kubelet.go:2427] "Starting kubelet main sync loop" Oct 29 01:22:00.389217 kubelet[1614]: E1029 01:22:00.389203 1614 kubelet.go:2451] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 29 01:22:00.389000 audit[1652]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:00.389000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe12f074f0 a2=0 a3=7ffe12f074dc items=0 ppid=1614 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 01:22:00.390000 audit[1654]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.390000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffefb922350 a2=0 a3=7ffefb92233c items=0 ppid=1614 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.390000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 01:22:00.390000 audit[1655]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:00.390000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffde1d1d3c0 a2=0 a3=7ffde1d1d3ac items=0 ppid=1614 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 01:22:00.392166 kubelet[1614]: E1029 01:22:00.392153 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:00.391000 audit[1657]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:00.391000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe4f21dbc0 a2=0 a3=7ffe4f21dbac items=0 ppid=1614 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 01:22:00.391000 audit[1656]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:00.391000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb23558e0 a2=0 a3=7fffb23558cc items=0 ppid=1614 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:00.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 01:22:00.493223 kubelet[1614]: E1029 01:22:00.492321 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:00.593595 kubelet[1614]: E1029 01:22:00.593571 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:00.651108 sudo[1485]: pam_unix(sudo:session): session closed for user root Oct 29 01:22:00.650000 audit[1485]: USER_END pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:22:00.650000 audit[1485]: CRED_DISP pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 01:22:00.651000 audit[1481]: USER_END pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:22:00.651000 audit[1481]: CRED_DISP pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 29 01:22:00.651840 sshd[1481]: pam_unix(sshd:session): session closed for user core Oct 29 01:22:00.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.102:22-139.178.68.195:59648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 01:22:00.653120 systemd[1]: sshd@6-139.178.70.102:22-139.178.68.195:59648.service: Deactivated successfully. Oct 29 01:22:00.653562 systemd[1]: session-9.scope: Deactivated successfully. Oct 29 01:22:00.653884 systemd-logind[1255]: Session 9 logged out. Waiting for processes to exit. Oct 29 01:22:00.654397 systemd-logind[1255]: Removed session 9. Oct 29 01:22:00.694607 kubelet[1614]: E1029 01:22:00.694581 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:00.795597 kubelet[1614]: E1029 01:22:00.795510 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:00.896240 kubelet[1614]: E1029 01:22:00.896213 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:00.997022 kubelet[1614]: E1029 01:22:00.996997 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:01.097805 kubelet[1614]: E1029 01:22:01.097730 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:01.164486 kubelet[1614]: I1029 01:22:01.164459 1614 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 29 01:22:01.164714 kubelet[1614]: I1029 01:22:01.164697 1614 reflector.go:568] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Oct 29 01:22:01.195796 kubelet[1614]: E1029 01:22:01.195772 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:01.198116 kubelet[1614]: E1029 01:22:01.198092 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:01.298393 kubelet[1614]: E1029 01:22:01.298369 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:01.398641 kubelet[1614]: E1029 01:22:01.398565 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:01.498829 kubelet[1614]: E1029 01:22:01.498795 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:01.599536 kubelet[1614]: E1029 01:22:01.599501 1614 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"10.67.124.134\" not found" Oct 29 01:22:01.700457 kubelet[1614]: I1029 01:22:01.700387 1614 kuberuntime_manager.go:1828] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 29 01:22:01.700968 env[1271]: time="2025-10-29T01:22:01.700942839Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 29 01:22:01.701263 kubelet[1614]: I1029 01:22:01.701252 1614 kubelet_network.go:47] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 29 01:22:02.196708 kubelet[1614]: E1029 01:22:02.196683 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:02.196866 kubelet[1614]: I1029 01:22:02.196837 1614 apiserver.go:52] "Watching apiserver" Oct 29 01:22:02.199819 kubelet[1614]: E1029 01:22:02.199802 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:02.203057 systemd[1]: Created slice kubepods-besteffort-podb21eb25f_f7ed_4c8b_b8c3_85170888bcbc.slice. Oct 29 01:22:02.212603 systemd[1]: Created slice kubepods-besteffort-podbe8585d4_ab49_4c53_8910_5c6fd7147e9f.slice. Oct 29 01:22:02.221799 kubelet[1614]: I1029 01:22:02.221781 1614 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Oct 29 01:22:02.230857 kubelet[1614]: I1029 01:22:02.230832 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-var-run-calico\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.230857 kubelet[1614]: I1029 01:22:02.230855 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2lvqd\" (UniqueName: \"kubernetes.io/projected/be8585d4-ab49-4c53-8910-5c6fd7147e9f-kube-api-access-2lvqd\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.230983 kubelet[1614]: I1029 01:22:02.230870 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5211ee36-d1d8-4e33-9939-d7954fab6be6-varrun\") pod \"csi-node-driver-prhdl\" (UID: \"5211ee36-d1d8-4e33-9939-d7954fab6be6\") " pod="calico-system/csi-node-driver-prhdl" Oct 29 01:22:02.230983 kubelet[1614]: I1029 01:22:02.230879 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-flexvol-driver-host\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.230983 kubelet[1614]: I1029 01:22:02.230888 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5211ee36-d1d8-4e33-9939-d7954fab6be6-registration-dir\") pod \"csi-node-driver-prhdl\" (UID: \"5211ee36-d1d8-4e33-9939-d7954fab6be6\") " pod="calico-system/csi-node-driver-prhdl" Oct 29 01:22:02.230983 kubelet[1614]: I1029 01:22:02.230895 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b21eb25f-f7ed-4c8b-b8c3-85170888bcbc-lib-modules\") pod \"kube-proxy-v69qf\" (UID: \"b21eb25f-f7ed-4c8b-b8c3-85170888bcbc\") " pod="kube-system/kube-proxy-v69qf" Oct 29 01:22:02.230983 kubelet[1614]: I1029 01:22:02.230903 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-cni-bin-dir\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231089 kubelet[1614]: I1029 01:22:02.230910 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-cni-log-dir\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231089 kubelet[1614]: I1029 01:22:02.230919 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/be8585d4-ab49-4c53-8910-5c6fd7147e9f-node-certs\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231089 kubelet[1614]: I1029 01:22:02.230927 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-policysync\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231089 kubelet[1614]: I1029 01:22:02.230935 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5211ee36-d1d8-4e33-9939-d7954fab6be6-kubelet-dir\") pod \"csi-node-driver-prhdl\" (UID: \"5211ee36-d1d8-4e33-9939-d7954fab6be6\") " pod="calico-system/csi-node-driver-prhdl" Oct 29 01:22:02.231089 kubelet[1614]: I1029 01:22:02.230942 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5211ee36-d1d8-4e33-9939-d7954fab6be6-socket-dir\") pod \"csi-node-driver-prhdl\" (UID: \"5211ee36-d1d8-4e33-9939-d7954fab6be6\") " pod="calico-system/csi-node-driver-prhdl" Oct 29 01:22:02.231181 kubelet[1614]: I1029 01:22:02.230951 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sv8h5\" (UniqueName: \"kubernetes.io/projected/5211ee36-d1d8-4e33-9939-d7954fab6be6-kube-api-access-sv8h5\") pod \"csi-node-driver-prhdl\" (UID: \"5211ee36-d1d8-4e33-9939-d7954fab6be6\") " pod="calico-system/csi-node-driver-prhdl" Oct 29 01:22:02.231181 kubelet[1614]: I1029 01:22:02.230958 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b21eb25f-f7ed-4c8b-b8c3-85170888bcbc-kube-proxy\") pod \"kube-proxy-v69qf\" (UID: \"b21eb25f-f7ed-4c8b-b8c3-85170888bcbc\") " pod="kube-system/kube-proxy-v69qf" Oct 29 01:22:02.231181 kubelet[1614]: I1029 01:22:02.230968 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b21eb25f-f7ed-4c8b-b8c3-85170888bcbc-xtables-lock\") pod \"kube-proxy-v69qf\" (UID: \"b21eb25f-f7ed-4c8b-b8c3-85170888bcbc\") " pod="kube-system/kube-proxy-v69qf" Oct 29 01:22:02.231181 kubelet[1614]: I1029 01:22:02.230977 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5vp4n\" (UniqueName: \"kubernetes.io/projected/b21eb25f-f7ed-4c8b-b8c3-85170888bcbc-kube-api-access-5vp4n\") pod \"kube-proxy-v69qf\" (UID: \"b21eb25f-f7ed-4c8b-b8c3-85170888bcbc\") " pod="kube-system/kube-proxy-v69qf" Oct 29 01:22:02.231181 kubelet[1614]: I1029 01:22:02.230985 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/be8585d4-ab49-4c53-8910-5c6fd7147e9f-tigera-ca-bundle\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231274 kubelet[1614]: I1029 01:22:02.231004 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-xtables-lock\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231274 kubelet[1614]: I1029 01:22:02.231019 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-cni-net-dir\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231274 kubelet[1614]: I1029 01:22:02.231034 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-lib-modules\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.231274 kubelet[1614]: I1029 01:22:02.231049 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/be8585d4-ab49-4c53-8910-5c6fd7147e9f-var-lib-calico\") pod \"calico-node-h6rcc\" (UID: \"be8585d4-ab49-4c53-8910-5c6fd7147e9f\") " pod="calico-system/calico-node-h6rcc" Oct 29 01:22:02.331960 kubelet[1614]: I1029 01:22:02.331932 1614 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 29 01:22:02.332907 kubelet[1614]: E1029 01:22:02.332893 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.332907 kubelet[1614]: W1029 01:22:02.332903 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.333005 kubelet[1614]: E1029 01:22:02.332916 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.333131 kubelet[1614]: E1029 01:22:02.333120 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.333131 kubelet[1614]: W1029 01:22:02.333127 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.333201 kubelet[1614]: E1029 01:22:02.333136 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.336762 kubelet[1614]: E1029 01:22:02.336743 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.336762 kubelet[1614]: W1029 01:22:02.336756 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.336850 kubelet[1614]: E1029 01:22:02.336769 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.336901 kubelet[1614]: E1029 01:22:02.336891 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.336901 kubelet[1614]: W1029 01:22:02.336898 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.336957 kubelet[1614]: E1029 01:22:02.336904 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.336999 kubelet[1614]: E1029 01:22:02.336990 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.336999 kubelet[1614]: W1029 01:22:02.336997 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.337046 kubelet[1614]: E1029 01:22:02.337002 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.337145 kubelet[1614]: E1029 01:22:02.337135 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.337145 kubelet[1614]: W1029 01:22:02.337141 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.337202 kubelet[1614]: E1029 01:22:02.337146 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.337225 kubelet[1614]: E1029 01:22:02.337216 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.337225 kubelet[1614]: W1029 01:22:02.337220 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.337225 kubelet[1614]: E1029 01:22:02.337225 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.337300 kubelet[1614]: E1029 01:22:02.337290 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.337300 kubelet[1614]: W1029 01:22:02.337297 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.337349 kubelet[1614]: E1029 01:22:02.337303 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.337397 kubelet[1614]: E1029 01:22:02.337387 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.337397 kubelet[1614]: W1029 01:22:02.337394 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.337444 kubelet[1614]: E1029 01:22:02.337398 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.337856 kubelet[1614]: E1029 01:22:02.337846 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.337856 kubelet[1614]: W1029 01:22:02.337853 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.337910 kubelet[1614]: E1029 01:22:02.337858 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.337954 kubelet[1614]: E1029 01:22:02.337943 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.337954 kubelet[1614]: W1029 01:22:02.337949 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.337954 kubelet[1614]: E1029 01:22:02.337954 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.346407 kubelet[1614]: E1029 01:22:02.346386 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.346407 kubelet[1614]: W1029 01:22:02.346398 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.346507 kubelet[1614]: E1029 01:22:02.346410 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.346538 kubelet[1614]: E1029 01:22:02.346530 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.346538 kubelet[1614]: W1029 01:22:02.346536 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.346576 kubelet[1614]: E1029 01:22:02.346542 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.346794 kubelet[1614]: E1029 01:22:02.346784 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:02.346794 kubelet[1614]: W1029 01:22:02.346791 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:02.346845 kubelet[1614]: E1029 01:22:02.346797 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:02.512140 env[1271]: time="2025-10-29T01:22:02.512115829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v69qf,Uid:b21eb25f-f7ed-4c8b-b8c3-85170888bcbc,Namespace:kube-system,Attempt:0,}" Oct 29 01:22:02.516255 env[1271]: time="2025-10-29T01:22:02.516229017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h6rcc,Uid:be8585d4-ab49-4c53-8910-5c6fd7147e9f,Namespace:calico-system,Attempt:0,}" Oct 29 01:22:03.047855 env[1271]: time="2025-10-29T01:22:03.047834631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.049836 env[1271]: time="2025-10-29T01:22:03.049819963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.050395 env[1271]: time="2025-10-29T01:22:03.050380776Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.051511 env[1271]: time="2025-10-29T01:22:03.051499419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.053007 env[1271]: time="2025-10-29T01:22:03.052991316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.054254 env[1271]: time="2025-10-29T01:22:03.054239226Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.054676 env[1271]: time="2025-10-29T01:22:03.054660550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.055706 env[1271]: time="2025-10-29T01:22:03.055686595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:03.072433 env[1271]: time="2025-10-29T01:22:03.062443784Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 01:22:03.072433 env[1271]: time="2025-10-29T01:22:03.062464525Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 01:22:03.072433 env[1271]: time="2025-10-29T01:22:03.062471576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 01:22:03.072433 env[1271]: time="2025-10-29T01:22:03.062586551Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/760199ae3496130b7fab4a602012d793755aeb821920a23780a9f1c46983463f pid=1693 runtime=io.containerd.runc.v2 Oct 29 01:22:03.072656 env[1271]: time="2025-10-29T01:22:03.062955809Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 01:22:03.072656 env[1271]: time="2025-10-29T01:22:03.062970775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 01:22:03.072656 env[1271]: time="2025-10-29T01:22:03.062976896Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 01:22:03.072656 env[1271]: time="2025-10-29T01:22:03.063088142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9 pid=1694 runtime=io.containerd.runc.v2 Oct 29 01:22:03.080264 systemd[1]: Started cri-containerd-760199ae3496130b7fab4a602012d793755aeb821920a23780a9f1c46983463f.scope. Oct 29 01:22:03.083534 systemd[1]: Started cri-containerd-841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9.scope. Oct 29 01:22:03.096591 kernel: kauditd_printk_skb: 243 callbacks suppressed Oct 29 01:22:03.096661 kernel: audit: type=1400 audit(1761700923.090:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.096677 kernel: audit: type=1400 audit(1761700923.090:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.099157 kernel: audit: type=1400 audit(1761700923.090:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.105910 kernel: audit: type=1400 audit(1761700923.090:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.105956 kernel: audit: type=1400 audit(1761700923.090:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.115141 kernel: audit: type=1400 audit(1761700923.090:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.115226 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 29 01:22:03.115241 kernel: audit: type=1400 audit(1761700923.090:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.115256 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 29 01:22:03.115267 kernel: audit: type=1400 audit(1761700923.090:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit: BPF prog-id=58 op=LOAD Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1693 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303139396165333439363133306237666162346136303230313264 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1693 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303139396165333439363133306237666162346136303230313264 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.095000 audit: BPF prog-id=59 op=LOAD Oct 29 01:22:03.095000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000300e70 items=0 ppid=1693 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303139396165333439363133306237666162346136303230313264 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit: BPF prog-id=60 op=LOAD Oct 29 01:22:03.098000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000300eb8 items=0 ppid=1693 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303139396165333439363133306237666162346136303230313264 Oct 29 01:22:03.098000 audit: BPF prog-id=60 op=UNLOAD Oct 29 01:22:03.098000 audit: BPF prog-id=59 op=UNLOAD Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.098000 audit: BPF prog-id=61 op=LOAD Oct 29 01:22:03.098000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003012c8 items=0 ppid=1693 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303139396165333439363133306237666162346136303230313264 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.114000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.114000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1694 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316366323639313930646536616565646336343538386237313266 Oct 29 01:22:03.118000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.118000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1694 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316366323639313930646536616565646336343538386237313266 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.119000 audit: BPF prog-id=63 op=LOAD Oct 29 01:22:03.119000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000278d10 items=0 ppid=1694 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316366323639313930646536616565646336343538386237313266 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit: BPF prog-id=64 op=LOAD Oct 29 01:22:03.120000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000278d58 items=0 ppid=1694 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316366323639313930646536616565646336343538386237313266 Oct 29 01:22:03.120000 audit: BPF prog-id=64 op=UNLOAD Oct 29 01:22:03.120000 audit: BPF prog-id=63 op=UNLOAD Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:03.120000 audit: BPF prog-id=65 op=LOAD Oct 29 01:22:03.120000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000279168 items=0 ppid=1694 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:03.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316366323639313930646536616565646336343538386237313266 Oct 29 01:22:03.123043 env[1271]: time="2025-10-29T01:22:03.123015104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v69qf,Uid:b21eb25f-f7ed-4c8b-b8c3-85170888bcbc,Namespace:kube-system,Attempt:0,} returns sandbox id \"760199ae3496130b7fab4a602012d793755aeb821920a23780a9f1c46983463f\"" Oct 29 01:22:03.124617 env[1271]: time="2025-10-29T01:22:03.124477616Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\"" Oct 29 01:22:03.129938 env[1271]: time="2025-10-29T01:22:03.129908818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h6rcc,Uid:be8585d4-ab49-4c53-8910-5c6fd7147e9f,Namespace:calico-system,Attempt:0,} returns sandbox id \"841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9\"" Oct 29 01:22:03.196986 kubelet[1614]: E1029 01:22:03.196941 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:03.337521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2479717090.mount: Deactivated successfully. Oct 29 01:22:04.152777 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount556440744.mount: Deactivated successfully. Oct 29 01:22:04.197325 kubelet[1614]: E1029 01:22:04.197291 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:04.390650 kubelet[1614]: E1029 01:22:04.389829 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:04.468125 env[1271]: time="2025-10-29T01:22:04.467871173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:04.469100 env[1271]: time="2025-10-29T01:22:04.469083108Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fc25172553d79197ecd840ec8dba1fba68330079355e974b04c1a441e6a4a0b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:04.469422 env[1271]: time="2025-10-29T01:22:04.469408439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:04.470299 env[1271]: time="2025-10-29T01:22:04.470284180Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:913cc83ca0b5588a81d86ce8eedeb3ed1e9c1326e81852a1ea4f622b74ff749a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:04.470582 env[1271]: time="2025-10-29T01:22:04.470565439Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\" returns image reference \"sha256:fc25172553d79197ecd840ec8dba1fba68330079355e974b04c1a441e6a4a0b7\"" Oct 29 01:22:04.471850 env[1271]: time="2025-10-29T01:22:04.471833494Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 29 01:22:04.473456 env[1271]: time="2025-10-29T01:22:04.473435611Z" level=info msg="CreateContainer within sandbox \"760199ae3496130b7fab4a602012d793755aeb821920a23780a9f1c46983463f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 29 01:22:04.478913 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount222556006.mount: Deactivated successfully. Oct 29 01:22:04.481865 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2362258300.mount: Deactivated successfully. Oct 29 01:22:04.483883 env[1271]: time="2025-10-29T01:22:04.483860930Z" level=info msg="CreateContainer within sandbox \"760199ae3496130b7fab4a602012d793755aeb821920a23780a9f1c46983463f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"291345b60cc436416ad88a20a961a930338ab31b105b515e2d6c0b3a402c195b\"" Oct 29 01:22:04.484498 env[1271]: time="2025-10-29T01:22:04.484483185Z" level=info msg="StartContainer for \"291345b60cc436416ad88a20a961a930338ab31b105b515e2d6c0b3a402c195b\"" Oct 29 01:22:04.496518 systemd[1]: Started cri-containerd-291345b60cc436416ad88a20a961a930338ab31b105b515e2d6c0b3a402c195b.scope. Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa710345b58 items=0 ppid=1693 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239313334356236306363343336343136616438386132306139363161 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit: BPF prog-id=66 op=LOAD Oct 29 01:22:04.505000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cbba8 items=0 ppid=1693 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239313334356236306363343336343136616438386132306139363161 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.505000 audit: BPF prog-id=67 op=LOAD Oct 29 01:22:04.505000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cbbf8 items=0 ppid=1693 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239313334356236306363343336343136616438386132306139363161 Oct 29 01:22:04.506000 audit: BPF prog-id=67 op=UNLOAD Oct 29 01:22:04.506000 audit: BPF prog-id=66 op=UNLOAD Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:04.506000 audit: BPF prog-id=68 op=LOAD Oct 29 01:22:04.506000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002cbc88 items=0 ppid=1693 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239313334356236306363343336343136616438386132306139363161 Oct 29 01:22:04.519638 env[1271]: time="2025-10-29T01:22:04.519608407Z" level=info msg="StartContainer for \"291345b60cc436416ad88a20a961a930338ab31b105b515e2d6c0b3a402c195b\" returns successfully" Oct 29 01:22:04.678000 audit[1830]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.678000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed4cc6f40 a2=0 a3=7ffed4cc6f2c items=0 ppid=1779 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 01:22:04.678000 audit[1831]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.678000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1d450700 a2=0 a3=7ffd1d4506ec items=0 ppid=1779 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 01:22:04.679000 audit[1832]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.679000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9a2e4130 a2=0 a3=7ffd9a2e411c items=0 ppid=1779 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 01:22:04.679000 audit[1833]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.679000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc937e5fb0 a2=0 a3=7ffc937e5f9c items=0 ppid=1779 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 01:22:04.680000 audit[1834]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.680000 audit[1835]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.680000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8e931a30 a2=0 a3=7ffe8e931a1c items=0 ppid=1779 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 01:22:04.680000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeca70ae50 a2=0 a3=7ffeca70ae3c items=0 ppid=1779 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 01:22:04.782000 audit[1838]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.782000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc80185e20 a2=0 a3=7ffc80185e0c items=0 ppid=1779 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 01:22:04.783000 audit[1840]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.783000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd11ec1cf0 a2=0 a3=7ffd11ec1cdc items=0 ppid=1779 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73002D Oct 29 01:22:04.785000 audit[1843]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.785000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdfefd8760 a2=0 a3=7ffdfefd874c items=0 ppid=1779 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 29 01:22:04.786000 audit[1844]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.786000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe60329ec0 a2=0 a3=7ffe60329eac items=0 ppid=1779 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 01:22:04.787000 audit[1846]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.787000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc14235050 a2=0 a3=7ffc1423503c items=0 ppid=1779 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 01:22:04.788000 audit[1847]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.788000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdeee2b2e0 a2=0 a3=7ffdeee2b2cc items=0 ppid=1779 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 01:22:04.790000 audit[1849]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.790000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea15ba0c0 a2=0 a3=7ffea15ba0ac items=0 ppid=1779 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.792000 audit[1852]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.792000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb0979770 a2=0 a3=7ffeb097975c items=0 ppid=1779 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.793000 audit[1853]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.793000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9a1c54b0 a2=0 a3=7fff9a1c549c items=0 ppid=1779 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 01:22:04.794000 audit[1855]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.794000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe49a2c680 a2=0 a3=7ffe49a2c66c items=0 ppid=1779 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 01:22:04.795000 audit[1856]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.795000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff43d80d80 a2=0 a3=7fff43d80d6c items=0 ppid=1779 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 01:22:04.796000 audit[1858]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.796000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe51863410 a2=0 a3=7ffe518633fc items=0 ppid=1779 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F5859 Oct 29 01:22:04.798000 audit[1861]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.798000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1c2a3b20 a2=0 a3=7fff1c2a3b0c items=0 ppid=1779 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 29 01:22:04.801000 audit[1864]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.801000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd3580ea0 a2=0 a3=7fffd3580e8c items=0 ppid=1779 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 29 01:22:04.801000 audit[1865]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.801000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd5244abd0 a2=0 a3=7ffd5244abbc items=0 ppid=1779 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 01:22:04.803000 audit[1867]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.803000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc3eeb3fc0 a2=0 a3=7ffc3eeb3fac items=0 ppid=1779 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.819000 audit[1871]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.819000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc05a87be0 a2=0 a3=7ffc05a87bcc items=0 ppid=1779 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.820000 audit[1872]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.820000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbcacc790 a2=0 a3=7fffbcacc77c items=0 ppid=1779 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 01:22:04.821000 audit[1874]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 01:22:04.821000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdd7716070 a2=0 a3=7ffdd771605c items=0 ppid=1779 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 01:22:04.838000 audit[1880]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:04.838000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd4d3af770 a2=0 a3=7ffd4d3af75c items=0 ppid=1779 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:04.858000 audit[1880]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:04.858000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffd4d3af770 a2=0 a3=7ffd4d3af75c items=0 ppid=1779 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:04.870000 audit[1889]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.870000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc08202aa0 a2=0 a3=7ffc08202a8c items=0 ppid=1779 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 01:22:04.872000 audit[1891]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.872000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd47c61660 a2=0 a3=7ffd47c6164c items=0 ppid=1779 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 29 01:22:04.875000 audit[1894]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.875000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffb5d15a80 a2=0 a3=7fffb5d15a6c items=0 ppid=1779 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C Oct 29 01:22:04.876000 audit[1895]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.876000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7bc553f0 a2=0 a3=7ffc7bc553dc items=0 ppid=1779 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 01:22:04.877000 audit[1897]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.877000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9a8f3590 a2=0 a3=7ffd9a8f357c items=0 ppid=1779 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 01:22:04.878000 audit[1898]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.878000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeede412c0 a2=0 a3=7ffeede412ac items=0 ppid=1779 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 01:22:04.880000 audit[1900]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.880000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3aac9dc0 a2=0 a3=7fff3aac9dac items=0 ppid=1779 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.882000 audit[1903]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.882000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe1977b720 a2=0 a3=7ffe1977b70c items=0 ppid=1779 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.884000 audit[1904]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.884000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc02f28f30 a2=0 a3=7ffc02f28f1c items=0 ppid=1779 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 01:22:04.886000 audit[1906]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.886000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdda8f9de0 a2=0 a3=7ffdda8f9dcc items=0 ppid=1779 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 01:22:04.886000 audit[1907]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.886000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbc3ed3e0 a2=0 a3=7fffbc3ed3cc items=0 ppid=1779 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 01:22:04.888000 audit[1909]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.888000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5c249a60 a2=0 a3=7fff5c249a4c items=0 ppid=1779 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 29 01:22:04.891000 audit[1912]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.891000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff71748eb0 a2=0 a3=7fff71748e9c items=0 ppid=1779 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 29 01:22:04.894000 audit[1915]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.894000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeed1d2120 a2=0 a3=7ffeed1d210c items=0 ppid=1779 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D5052 Oct 29 01:22:04.895000 audit[1916]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.895000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcf7509ce0 a2=0 a3=7ffcf7509ccc items=0 ppid=1779 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 01:22:04.896000 audit[1918]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.896000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff187eb9d0 a2=0 a3=7fff187eb9bc items=0 ppid=1779 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.899000 audit[1921]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.899000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda17df940 a2=0 a3=7ffda17df92c items=0 ppid=1779 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 01:22:04.900000 audit[1922]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.900000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb1b0d110 a2=0 a3=7fffb1b0d0fc items=0 ppid=1779 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 01:22:04.901000 audit[1924]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.901000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd65e8ce90 a2=0 a3=7ffd65e8ce7c items=0 ppid=1779 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 01:22:04.902000 audit[1925]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.902000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcf038c80 a2=0 a3=7fffcf038c6c items=0 ppid=1779 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 01:22:04.904000 audit[1927]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.904000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed065f190 a2=0 a3=7ffed065f17c items=0 ppid=1779 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 01:22:04.907000 audit[1930]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 01:22:04.907000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc89fd38d0 a2=0 a3=7ffc89fd38bc items=0 ppid=1779 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 01:22:04.910000 audit[1932]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 01:22:04.910000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd71e75a20 a2=0 a3=7ffd71e75a0c items=0 ppid=1779 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.910000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:04.910000 audit[1932]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 01:22:04.910000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd71e75a20 a2=0 a3=7ffd71e75a0c items=0 ppid=1779 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:04.910000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:05.197676 kubelet[1614]: E1029 01:22:05.197594 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:05.400769 kubelet[1614]: I1029 01:22:05.400725 1614 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-v69qf" podStartSLOduration=4.053511664 podStartE2EDuration="5.400715439s" podCreationTimestamp="2025-10-29 01:22:00 +0000 UTC" firstStartedPulling="2025-10-29 01:22:03.124137532 +0000 UTC m=+3.476431291" lastFinishedPulling="2025-10-29 01:22:04.471341308 +0000 UTC m=+4.823635066" observedRunningTime="2025-10-29 01:22:05.400216493 +0000 UTC m=+5.752510266" watchObservedRunningTime="2025-10-29 01:22:05.400715439 +0000 UTC m=+5.753009207" Oct 29 01:22:05.439090 kubelet[1614]: E1029 01:22:05.439039 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439090 kubelet[1614]: W1029 01:22:05.439083 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.439212 kubelet[1614]: E1029 01:22:05.439098 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.439212 kubelet[1614]: E1029 01:22:05.439199 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439212 kubelet[1614]: W1029 01:22:05.439204 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.439212 kubelet[1614]: E1029 01:22:05.439208 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.439303 kubelet[1614]: E1029 01:22:05.439292 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439303 kubelet[1614]: W1029 01:22:05.439300 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.439356 kubelet[1614]: E1029 01:22:05.439305 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.439592 kubelet[1614]: E1029 01:22:05.439577 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439619 kubelet[1614]: W1029 01:22:05.439592 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.439619 kubelet[1614]: E1029 01:22:05.439598 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.439694 kubelet[1614]: E1029 01:22:05.439686 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439694 kubelet[1614]: W1029 01:22:05.439692 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.439743 kubelet[1614]: E1029 01:22:05.439698 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.439788 kubelet[1614]: E1029 01:22:05.439779 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439788 kubelet[1614]: W1029 01:22:05.439785 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.439837 kubelet[1614]: E1029 01:22:05.439790 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.439878 kubelet[1614]: E1029 01:22:05.439869 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439878 kubelet[1614]: W1029 01:22:05.439876 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.439931 kubelet[1614]: E1029 01:22:05.439881 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.439976 kubelet[1614]: E1029 01:22:05.439968 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.439976 kubelet[1614]: W1029 01:22:05.439974 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440026 kubelet[1614]: E1029 01:22:05.439978 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440079 kubelet[1614]: E1029 01:22:05.440061 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440079 kubelet[1614]: W1029 01:22:05.440075 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440128 kubelet[1614]: E1029 01:22:05.440080 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440153 kubelet[1614]: E1029 01:22:05.440150 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440173 kubelet[1614]: W1029 01:22:05.440154 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440173 kubelet[1614]: E1029 01:22:05.440158 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440241 kubelet[1614]: E1029 01:22:05.440232 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440241 kubelet[1614]: W1029 01:22:05.440240 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440293 kubelet[1614]: E1029 01:22:05.440246 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440339 kubelet[1614]: E1029 01:22:05.440331 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440339 kubelet[1614]: W1029 01:22:05.440337 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440388 kubelet[1614]: E1029 01:22:05.440342 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440434 kubelet[1614]: E1029 01:22:05.440426 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440434 kubelet[1614]: W1029 01:22:05.440432 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440483 kubelet[1614]: E1029 01:22:05.440436 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440520 kubelet[1614]: E1029 01:22:05.440510 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440520 kubelet[1614]: W1029 01:22:05.440517 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440520 kubelet[1614]: E1029 01:22:05.440521 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440613 kubelet[1614]: E1029 01:22:05.440604 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440613 kubelet[1614]: W1029 01:22:05.440612 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440665 kubelet[1614]: E1029 01:22:05.440616 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440703 kubelet[1614]: E1029 01:22:05.440692 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440703 kubelet[1614]: W1029 01:22:05.440700 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440752 kubelet[1614]: E1029 01:22:05.440704 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440796 kubelet[1614]: E1029 01:22:05.440786 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440796 kubelet[1614]: W1029 01:22:05.440793 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440847 kubelet[1614]: E1029 01:22:05.440798 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440880 kubelet[1614]: E1029 01:22:05.440871 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440880 kubelet[1614]: W1029 01:22:05.440877 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.440932 kubelet[1614]: E1029 01:22:05.440881 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.440969 kubelet[1614]: E1029 01:22:05.440959 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.440969 kubelet[1614]: W1029 01:22:05.440966 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.441020 kubelet[1614]: E1029 01:22:05.440971 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.441053 kubelet[1614]: E1029 01:22:05.441043 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.441053 kubelet[1614]: W1029 01:22:05.441050 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.441129 kubelet[1614]: E1029 01:22:05.441055 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.451278 kubelet[1614]: E1029 01:22:05.451152 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.451278 kubelet[1614]: W1029 01:22:05.451164 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.451278 kubelet[1614]: E1029 01:22:05.451176 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452581 kubelet[1614]: E1029 01:22:05.451415 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452581 kubelet[1614]: W1029 01:22:05.451421 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452581 kubelet[1614]: E1029 01:22:05.451426 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452581 kubelet[1614]: E1029 01:22:05.451597 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452581 kubelet[1614]: W1029 01:22:05.451602 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452581 kubelet[1614]: E1029 01:22:05.451607 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452581 kubelet[1614]: E1029 01:22:05.451684 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452581 kubelet[1614]: W1029 01:22:05.451689 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452581 kubelet[1614]: E1029 01:22:05.451694 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452581 kubelet[1614]: E1029 01:22:05.451776 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452794 kubelet[1614]: W1029 01:22:05.451780 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452794 kubelet[1614]: E1029 01:22:05.451784 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452794 kubelet[1614]: E1029 01:22:05.451863 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452794 kubelet[1614]: W1029 01:22:05.451868 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452794 kubelet[1614]: E1029 01:22:05.451872 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452794 kubelet[1614]: E1029 01:22:05.452054 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452794 kubelet[1614]: W1029 01:22:05.452058 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452794 kubelet[1614]: E1029 01:22:05.452097 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452794 kubelet[1614]: E1029 01:22:05.452178 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452794 kubelet[1614]: W1029 01:22:05.452182 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452962 kubelet[1614]: E1029 01:22:05.452187 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452962 kubelet[1614]: E1029 01:22:05.452254 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452962 kubelet[1614]: W1029 01:22:05.452258 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452962 kubelet[1614]: E1029 01:22:05.452263 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452962 kubelet[1614]: E1029 01:22:05.452327 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452962 kubelet[1614]: W1029 01:22:05.452331 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452962 kubelet[1614]: E1029 01:22:05.452335 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.452962 kubelet[1614]: E1029 01:22:05.452409 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.452962 kubelet[1614]: W1029 01:22:05.452413 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.452962 kubelet[1614]: E1029 01:22:05.452418 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.453134 kubelet[1614]: E1029 01:22:05.452560 1614 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 01:22:05.453134 kubelet[1614]: W1029 01:22:05.452565 1614 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 01:22:05.453134 kubelet[1614]: E1029 01:22:05.452569 1614 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 01:22:05.909256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1936650415.mount: Deactivated successfully. Oct 29 01:22:05.981546 env[1271]: time="2025-10-29T01:22:05.981520233Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:05.982201 env[1271]: time="2025-10-29T01:22:05.982185286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:05.982947 env[1271]: time="2025-10-29T01:22:05.982932808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:05.983641 env[1271]: time="2025-10-29T01:22:05.983626723Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:05.984006 env[1271]: time="2025-10-29T01:22:05.983989426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 29 01:22:05.985995 env[1271]: time="2025-10-29T01:22:05.985973920Z" level=info msg="CreateContainer within sandbox \"841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 29 01:22:05.991298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2855502441.mount: Deactivated successfully. Oct 29 01:22:06.004915 env[1271]: time="2025-10-29T01:22:06.004883356Z" level=info msg="CreateContainer within sandbox \"841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"426d0ca06ce2b139f9830f49dfef4467c4aa84f6be18dc501764e8faf3df0cee\"" Oct 29 01:22:06.005343 env[1271]: time="2025-10-29T01:22:06.005324461Z" level=info msg="StartContainer for \"426d0ca06ce2b139f9830f49dfef4467c4aa84f6be18dc501764e8faf3df0cee\"" Oct 29 01:22:06.015258 systemd[1]: Started cri-containerd-426d0ca06ce2b139f9830f49dfef4467c4aa84f6be18dc501764e8faf3df0cee.scope. Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa2cc658a18 items=0 ppid=1694 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:06.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366430636130366365326231333966393833306634396466656634 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit: BPF prog-id=69 op=LOAD Oct 29 01:22:06.025000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dfba8 items=0 ppid=1694 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:06.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366430636130366365326231333966393833306634396466656634 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit: BPF prog-id=70 op=LOAD Oct 29 01:22:06.025000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000dfbf8 items=0 ppid=1694 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:06.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366430636130366365326231333966393833306634396466656634 Oct 29 01:22:06.025000 audit: BPF prog-id=70 op=UNLOAD Oct 29 01:22:06.025000 audit: BPF prog-id=69 op=UNLOAD Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:06.025000 audit: BPF prog-id=71 op=LOAD Oct 29 01:22:06.025000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000dfc88 items=0 ppid=1694 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:06.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366430636130366365326231333966393833306634396466656634 Oct 29 01:22:06.037125 env[1271]: time="2025-10-29T01:22:06.037099891Z" level=info msg="StartContainer for \"426d0ca06ce2b139f9830f49dfef4467c4aa84f6be18dc501764e8faf3df0cee\" returns successfully" Oct 29 01:22:06.039718 systemd[1]: cri-containerd-426d0ca06ce2b139f9830f49dfef4467c4aa84f6be18dc501764e8faf3df0cee.scope: Deactivated successfully. Oct 29 01:22:06.040000 audit: BPF prog-id=71 op=UNLOAD Oct 29 01:22:06.198257 kubelet[1614]: E1029 01:22:06.198181 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:06.288280 env[1271]: time="2025-10-29T01:22:06.288244404Z" level=info msg="shim disconnected" id=426d0ca06ce2b139f9830f49dfef4467c4aa84f6be18dc501764e8faf3df0cee Oct 29 01:22:06.288280 env[1271]: time="2025-10-29T01:22:06.288273640Z" level=warning msg="cleaning up after shim disconnected" id=426d0ca06ce2b139f9830f49dfef4467c4aa84f6be18dc501764e8faf3df0cee namespace=k8s.io Oct 29 01:22:06.288280 env[1271]: time="2025-10-29T01:22:06.288280723Z" level=info msg="cleaning up dead shim" Oct 29 01:22:06.292227 env[1271]: time="2025-10-29T01:22:06.292207370Z" level=warning msg="cleanup warnings time=\"2025-10-29T01:22:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2013 runtime=io.containerd.runc.v2\n" Oct 29 01:22:06.389635 kubelet[1614]: E1029 01:22:06.389265 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:06.412284 env[1271]: time="2025-10-29T01:22:06.412238885Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 29 01:22:07.199133 kubelet[1614]: E1029 01:22:07.199106 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:08.199810 kubelet[1614]: E1029 01:22:08.199787 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:08.390872 kubelet[1614]: E1029 01:22:08.390667 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:09.096627 env[1271]: time="2025-10-29T01:22:09.096599224Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:09.097789 env[1271]: time="2025-10-29T01:22:09.097773483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:09.098778 env[1271]: time="2025-10-29T01:22:09.098766240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:09.099694 env[1271]: time="2025-10-29T01:22:09.099681847Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:09.100006 env[1271]: time="2025-10-29T01:22:09.099992354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 29 01:22:09.102245 env[1271]: time="2025-10-29T01:22:09.102221102Z" level=info msg="CreateContainer within sandbox \"841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 29 01:22:09.108234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1980591396.mount: Deactivated successfully. Oct 29 01:22:09.116468 env[1271]: time="2025-10-29T01:22:09.116445260Z" level=info msg="CreateContainer within sandbox \"841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726\"" Oct 29 01:22:09.116980 env[1271]: time="2025-10-29T01:22:09.116936996Z" level=info msg="StartContainer for \"0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726\"" Oct 29 01:22:09.131145 systemd[1]: Started cri-containerd-0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726.scope. Oct 29 01:22:09.140000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141919 kernel: kauditd_printk_skb: 346 callbacks suppressed Oct 29 01:22:09.141959 kernel: audit: type=1400 audit(1761700929.140:524): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.140000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fdd360afb48 items=0 ppid=1694 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:09.149456 kernel: audit: type=1300 audit(1761700929.140:524): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fdd360afb48 items=0 ppid=1694 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:09.149503 kernel: audit: type=1327 audit(1761700929.140:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323936616338663439373862303335353164396263323964663439 Oct 29 01:22:09.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323936616338663439373862303335353164396263323964663439 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156852 kernel: audit: type=1400 audit(1761700929.141:525): avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156890 kernel: audit: type=1400 audit(1761700929.141:525): avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.163128 kernel: audit: type=1400 audit(1761700929.141:525): avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.163182 kernel: audit: type=1400 audit(1761700929.141:525): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.172443 kernel: audit: type=1400 audit(1761700929.141:525): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.172519 kernel: audit: type=1400 audit(1761700929.141:525): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.175355 kernel: audit: type=1400 audit(1761700929.141:525): avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.141000 audit: BPF prog-id=72 op=LOAD Oct 29 01:22:09.141000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0000a33d8 items=0 ppid=1694 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:09.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323936616338663439373862303335353164396263323964663439 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.144000 audit: BPF prog-id=73 op=LOAD Oct 29 01:22:09.144000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0000a3428 items=0 ppid=1694 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:09.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323936616338663439373862303335353164396263323964663439 Oct 29 01:22:09.156000 audit: BPF prog-id=73 op=UNLOAD Oct 29 01:22:09.156000 audit: BPF prog-id=72 op=UNLOAD Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:09.156000 audit: BPF prog-id=74 op=LOAD Oct 29 01:22:09.156000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0000a34b8 items=0 ppid=1694 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:09.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323936616338663439373862303335353164396263323964663439 Oct 29 01:22:09.180014 env[1271]: time="2025-10-29T01:22:09.179994345Z" level=info msg="StartContainer for \"0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726\" returns successfully" Oct 29 01:22:09.200476 kubelet[1614]: E1029 01:22:09.200434 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:10.180820 env[1271]: time="2025-10-29T01:22:10.180780964Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 01:22:10.182572 systemd[1]: cri-containerd-0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726.scope: Deactivated successfully. Oct 29 01:22:10.185000 audit: BPF prog-id=74 op=UNLOAD Oct 29 01:22:10.194799 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726-rootfs.mount: Deactivated successfully. Oct 29 01:22:10.201714 kubelet[1614]: E1029 01:22:10.200569 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:10.218623 kubelet[1614]: I1029 01:22:10.218602 1614 kubelet_node_status.go:439] "Fast updating node status as it just became ready" Oct 29 01:22:10.392461 systemd[1]: Created slice kubepods-besteffort-pod5211ee36_d1d8_4e33_9939_d7954fab6be6.slice. Oct 29 01:22:10.406557 env[1271]: time="2025-10-29T01:22:10.406511451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-prhdl,Uid:5211ee36-d1d8-4e33-9939-d7954fab6be6,Namespace:calico-system,Attempt:0,}" Oct 29 01:22:10.519031 env[1271]: time="2025-10-29T01:22:10.518984309Z" level=error msg="Failed to destroy network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:10.520521 env[1271]: time="2025-10-29T01:22:10.520341246Z" level=error msg="encountered an error cleaning up failed sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:10.519999 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c-shm.mount: Deactivated successfully. Oct 29 01:22:10.520608 env[1271]: time="2025-10-29T01:22:10.520517229Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-prhdl,Uid:5211ee36-d1d8-4e33-9939-d7954fab6be6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:10.520986 kubelet[1614]: E1029 01:22:10.520719 1614 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:10.520986 kubelet[1614]: E1029 01:22:10.520757 1614 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-prhdl" Oct 29 01:22:10.520986 kubelet[1614]: E1029 01:22:10.520771 1614 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-prhdl" Oct 29 01:22:10.521083 kubelet[1614]: E1029 01:22:10.520805 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-prhdl_calico-system(5211ee36-d1d8-4e33-9939-d7954fab6be6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-prhdl_calico-system(5211ee36-d1d8-4e33-9939-d7954fab6be6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:10.582353 env[1271]: time="2025-10-29T01:22:10.582321414Z" level=info msg="shim disconnected" id=0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726 Oct 29 01:22:10.582497 env[1271]: time="2025-10-29T01:22:10.582481777Z" level=warning msg="cleaning up after shim disconnected" id=0c296ac8f4978b03551d9bc29df49cea945ecd927fbc848138c3372e740fc726 namespace=k8s.io Oct 29 01:22:10.582565 env[1271]: time="2025-10-29T01:22:10.582552184Z" level=info msg="cleaning up dead shim" Oct 29 01:22:10.587592 env[1271]: time="2025-10-29T01:22:10.587565844Z" level=warning msg="cleanup warnings time=\"2025-10-29T01:22:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2099 runtime=io.containerd.runc.v2\n" Oct 29 01:22:11.201723 kubelet[1614]: E1029 01:22:11.201696 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:11.419672 env[1271]: time="2025-10-29T01:22:11.419612367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 29 01:22:11.420573 kubelet[1614]: I1029 01:22:11.420423 1614 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Oct 29 01:22:11.421001 env[1271]: time="2025-10-29T01:22:11.420967620Z" level=info msg="StopPodSandbox for \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\"" Oct 29 01:22:11.443223 env[1271]: time="2025-10-29T01:22:11.443188146Z" level=error msg="StopPodSandbox for \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\" failed" error="failed to destroy network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:11.443621 kubelet[1614]: E1029 01:22:11.443487 1614 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Oct 29 01:22:11.443621 kubelet[1614]: E1029 01:22:11.443530 1614 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c"} Oct 29 01:22:11.443621 kubelet[1614]: E1029 01:22:11.443576 1614 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5211ee36-d1d8-4e33-9939-d7954fab6be6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 01:22:11.443621 kubelet[1614]: E1029 01:22:11.443595 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5211ee36-d1d8-4e33-9939-d7954fab6be6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:12.202580 kubelet[1614]: E1029 01:22:12.202545 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:12.332264 systemd[1]: Created slice kubepods-besteffort-pod53650f20_c9a9_4e13_aeee_ad07ec9b1052.slice. Oct 29 01:22:12.364015 update_engine[1257]: I1029 01:22:12.363970 1257 update_attempter.cc:509] Updating boot flags... Oct 29 01:22:12.386720 kubelet[1614]: I1029 01:22:12.386672 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4dkc9\" (UniqueName: \"kubernetes.io/projected/53650f20-c9a9-4e13-aeee-ad07ec9b1052-kube-api-access-4dkc9\") pod \"nginx-deployment-bb8f74bfb-vv6n7\" (UID: \"53650f20-c9a9-4e13-aeee-ad07ec9b1052\") " pod="default/nginx-deployment-bb8f74bfb-vv6n7" Oct 29 01:22:12.650358 env[1271]: time="2025-10-29T01:22:12.649952894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-vv6n7,Uid:53650f20-c9a9-4e13-aeee-ad07ec9b1052,Namespace:default,Attempt:0,}" Oct 29 01:22:12.735305 env[1271]: time="2025-10-29T01:22:12.735258785Z" level=error msg="Failed to destroy network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:12.736290 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda-shm.mount: Deactivated successfully. Oct 29 01:22:12.737452 env[1271]: time="2025-10-29T01:22:12.737416784Z" level=error msg="encountered an error cleaning up failed sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:12.737492 env[1271]: time="2025-10-29T01:22:12.737472205Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-vv6n7,Uid:53650f20-c9a9-4e13-aeee-ad07ec9b1052,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:12.737908 kubelet[1614]: E1029 01:22:12.737647 1614 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:12.737908 kubelet[1614]: E1029 01:22:12.737686 1614 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-vv6n7" Oct 29 01:22:12.737908 kubelet[1614]: E1029 01:22:12.737701 1614 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-bb8f74bfb-vv6n7" Oct 29 01:22:12.738021 kubelet[1614]: E1029 01:22:12.737735 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-bb8f74bfb-vv6n7_default(53650f20-c9a9-4e13-aeee-ad07ec9b1052)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-bb8f74bfb-vv6n7_default(53650f20-c9a9-4e13-aeee-ad07ec9b1052)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-vv6n7" podUID="53650f20-c9a9-4e13-aeee-ad07ec9b1052" Oct 29 01:22:13.203687 kubelet[1614]: E1029 01:22:13.203656 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:13.423061 kubelet[1614]: I1029 01:22:13.423040 1614 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Oct 29 01:22:13.423456 env[1271]: time="2025-10-29T01:22:13.423436986Z" level=info msg="StopPodSandbox for \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\"" Oct 29 01:22:13.441886 env[1271]: time="2025-10-29T01:22:13.441850208Z" level=error msg="StopPodSandbox for \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\" failed" error="failed to destroy network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 01:22:13.442189 kubelet[1614]: E1029 01:22:13.442162 1614 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Oct 29 01:22:13.442230 kubelet[1614]: E1029 01:22:13.442197 1614 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda"} Oct 29 01:22:13.442230 kubelet[1614]: E1029 01:22:13.442224 1614 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53650f20-c9a9-4e13-aeee-ad07ec9b1052\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 01:22:13.442316 kubelet[1614]: E1029 01:22:13.442243 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53650f20-c9a9-4e13-aeee-ad07ec9b1052\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-bb8f74bfb-vv6n7" podUID="53650f20-c9a9-4e13-aeee-ad07ec9b1052" Oct 29 01:22:14.204218 kubelet[1614]: E1029 01:22:14.204169 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:15.204911 kubelet[1614]: E1029 01:22:15.204863 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:16.205183 kubelet[1614]: E1029 01:22:16.205149 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:16.391410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3099897880.mount: Deactivated successfully. Oct 29 01:22:16.483401 env[1271]: time="2025-10-29T01:22:16.483117773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:16.494200 env[1271]: time="2025-10-29T01:22:16.494168917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:16.495204 env[1271]: time="2025-10-29T01:22:16.495188508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:16.495747 env[1271]: time="2025-10-29T01:22:16.495734489Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:16.496036 env[1271]: time="2025-10-29T01:22:16.496022108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 29 01:22:16.508295 env[1271]: time="2025-10-29T01:22:16.508270901Z" level=info msg="CreateContainer within sandbox \"841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 29 01:22:16.515019 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1353917668.mount: Deactivated successfully. Oct 29 01:22:16.517004 env[1271]: time="2025-10-29T01:22:16.516977410Z" level=info msg="CreateContainer within sandbox \"841cf269190de6aeedc64588b712f660d83b0e818e70dc779e8343dfcefeb8e9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"667aa27409239fa0d11881e64f131911f66664a618384a08cab699cd56d069af\"" Oct 29 01:22:16.517352 env[1271]: time="2025-10-29T01:22:16.517339495Z" level=info msg="StartContainer for \"667aa27409239fa0d11881e64f131911f66664a618384a08cab699cd56d069af\"" Oct 29 01:22:16.527934 systemd[1]: Started cri-containerd-667aa27409239fa0d11881e64f131911f66664a618384a08cab699cd56d069af.scope. Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.544519 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 29 01:22:16.544571 kernel: audit: type=1400 audit(1761700936.542:531): avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fbd7c34d7b8 items=0 ppid=1694 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:16.550621 kernel: audit: type=1300 audit(1761700936.542:531): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fbd7c34d7b8 items=0 ppid=1694 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:16.550734 kernel: audit: type=1327 audit(1761700936.542:531): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636376161323734303932333966613064313138383165363466313331 Oct 29 01:22:16.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636376161323734303932333966613064313138383165363466313331 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.556413 kernel: audit: type=1400 audit(1761700936.542:532): avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.558851 kernel: audit: type=1400 audit(1761700936.542:532): avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.558895 kernel: audit: type=1400 audit(1761700936.542:532): avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.563763 kernel: audit: type=1400 audit(1761700936.542:532): avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.563807 kernel: audit: type=1400 audit(1761700936.542:532): avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.571305 kernel: audit: type=1400 audit(1761700936.542:532): avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.571349 kernel: audit: type=1400 audit(1761700936.542:532): avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.542000 audit: BPF prog-id=75 op=LOAD Oct 29 01:22:16.542000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c23e8 items=0 ppid=1694 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:16.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636376161323734303932333966613064313138383165363466313331 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.545000 audit: BPF prog-id=76 op=LOAD Oct 29 01:22:16.545000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c2438 items=0 ppid=1694 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:16.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636376161323734303932333966613064313138383165363466313331 Oct 29 01:22:16.553000 audit: BPF prog-id=76 op=UNLOAD Oct 29 01:22:16.553000 audit: BPF prog-id=75 op=UNLOAD Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:16.553000 audit: BPF prog-id=77 op=LOAD Oct 29 01:22:16.553000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c24c8 items=0 ppid=1694 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:16.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636376161323734303932333966613064313138383165363466313331 Oct 29 01:22:16.582010 env[1271]: time="2025-10-29T01:22:16.581986549Z" level=info msg="StartContainer for \"667aa27409239fa0d11881e64f131911f66664a618384a08cab699cd56d069af\" returns successfully" Oct 29 01:22:16.645263 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 29 01:22:16.645340 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 29 01:22:17.206252 kubelet[1614]: E1029 01:22:17.206202 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:17.808000 audit[2299]: AVC avc: denied { write } for pid=2299 comm="tee" name="fd" dev="proc" ino=30559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 01:22:17.808000 audit[2299]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe208687e5 a2=241 a3=1b6 items=1 ppid=2263 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.808000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 29 01:22:17.808000 audit: PATH item=0 name="/dev/fd/63" inode=30546 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:17.808000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 01:22:17.809000 audit[2302]: AVC avc: denied { write } for pid=2302 comm="tee" name="fd" dev="proc" ino=30563 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 01:22:17.809000 audit[2302]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5a0c47e5 a2=241 a3=1b6 items=1 ppid=2270 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.809000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 29 01:22:17.809000 audit: PATH item=0 name="/dev/fd/63" inode=30547 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:17.809000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 01:22:17.819000 audit[2315]: AVC avc: denied { write } for pid=2315 comm="tee" name="fd" dev="proc" ino=30573 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 01:22:17.819000 audit[2315]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecbc5f7d5 a2=241 a3=1b6 items=1 ppid=2274 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.819000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 29 01:22:17.819000 audit: PATH item=0 name="/dev/fd/63" inode=30554 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:17.820000 audit[2320]: AVC avc: denied { write } for pid=2320 comm="tee" name="fd" dev="proc" ino=29461 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 01:22:17.820000 audit[2320]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2607f7e6 a2=241 a3=1b6 items=1 ppid=2268 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.819000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 01:22:17.820000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 29 01:22:17.820000 audit: PATH item=0 name="/dev/fd/63" inode=29453 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:17.820000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 01:22:17.823000 audit[2329]: AVC avc: denied { write } for pid=2329 comm="tee" name="fd" dev="proc" ino=30578 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 01:22:17.825000 audit[2331]: AVC avc: denied { write } for pid=2331 comm="tee" name="fd" dev="proc" ino=29465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 01:22:17.825000 audit[2331]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5deb77e7 a2=241 a3=1b6 items=1 ppid=2277 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.825000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 29 01:22:17.825000 audit: PATH item=0 name="/dev/fd/63" inode=29458 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:17.825000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 01:22:17.823000 audit[2329]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec242c7e5 a2=241 a3=1b6 items=1 ppid=2267 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.823000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 29 01:22:17.823000 audit: PATH item=0 name="/dev/fd/63" inode=30568 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:17.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 01:22:17.831000 audit[2335]: AVC avc: denied { write } for pid=2335 comm="tee" name="fd" dev="proc" ino=30582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 01:22:17.831000 audit[2335]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc174837d6 a2=241 a3=1b6 items=1 ppid=2276 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.831000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 29 01:22:17.831000 audit: PATH item=0 name="/dev/fd/63" inode=30575 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:17.831000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit: BPF prog-id=78 op=LOAD Oct 29 01:22:17.971000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd359ab840 a2=98 a3=1fffffffffffffff items=0 ppid=2269 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.971000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 01:22:17.971000 audit: BPF prog-id=78 op=UNLOAD Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.971000 audit: BPF prog-id=79 op=LOAD Oct 29 01:22:17.971000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd359ab720 a2=94 a3=3 items=0 ppid=2269 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.971000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 01:22:17.972000 audit: BPF prog-id=79 op=UNLOAD Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit: BPF prog-id=80 op=LOAD Oct 29 01:22:17.972000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd359ab760 a2=94 a3=7ffd359ab940 items=0 ppid=2269 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.972000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 01:22:17.972000 audit: BPF prog-id=80 op=UNLOAD Oct 29 01:22:17.972000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.972000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd359ab830 a2=50 a3=a000000085 items=0 ppid=2269 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.972000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.973000 audit: BPF prog-id=81 op=LOAD Oct 29 01:22:17.973000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd61439d0 a2=98 a3=3 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.973000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:17.974000 audit: BPF prog-id=81 op=UNLOAD Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit: BPF prog-id=82 op=LOAD Oct 29 01:22:17.974000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd61437c0 a2=94 a3=54428f items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.974000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:17.974000 audit: BPF prog-id=82 op=UNLOAD Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:17.974000 audit: BPF prog-id=83 op=LOAD Oct 29 01:22:17.974000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd61437f0 a2=94 a3=2 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:17.974000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:17.974000 audit: BPF prog-id=83 op=UNLOAD Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit: BPF prog-id=84 op=LOAD Oct 29 01:22:18.045000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd61436b0 a2=94 a3=1 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.045000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.045000 audit: BPF prog-id=84 op=UNLOAD Oct 29 01:22:18.045000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.045000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcd6143780 a2=50 a3=7ffcd6143860 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.045000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd61436c0 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd61436f0 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd6143600 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd6143710 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd61436f0 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd61436e0 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd6143710 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd61436f0 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd6143710 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd61436e0 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd6143750 a2=28 a3=0 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd6143500 a2=50 a3=1 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit: BPF prog-id=85 op=LOAD Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd6143500 a2=94 a3=5 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit: BPF prog-id=85 op=UNLOAD Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd61435b0 a2=50 a3=1 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcd61436d0 a2=4 a3=38 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.052000 audit[2375]: AVC avc: denied { confidentiality } for pid=2375 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:18.052000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd6143720 a2=94 a3=6 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { confidentiality } for pid=2375 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:18.053000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd6142ed0 a2=94 a3=88 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { perfmon } for pid=2375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { bpf } for pid=2375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.053000 audit[2375]: AVC avc: denied { confidentiality } for pid=2375 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:18.053000 audit[2375]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd6142ed0 a2=94 a3=88 items=0 ppid=2269 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.058000 audit: BPF prog-id=86 op=LOAD Oct 29 01:22:18.058000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce01c12a0 a2=98 a3=1999999999999999 items=0 ppid=2269 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.058000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 01:22:18.059000 audit: BPF prog-id=86 op=UNLOAD Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit: BPF prog-id=87 op=LOAD Oct 29 01:22:18.059000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce01c1180 a2=94 a3=ffff items=0 ppid=2269 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.059000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 01:22:18.059000 audit: BPF prog-id=87 op=UNLOAD Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.059000 audit: BPF prog-id=88 op=LOAD Oct 29 01:22:18.059000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce01c11c0 a2=94 a3=7ffce01c13a0 items=0 ppid=2269 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.059000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 01:22:18.059000 audit: BPF prog-id=88 op=UNLOAD Oct 29 01:22:18.193168 systemd-networkd[1079]: vxlan.calico: Link UP Oct 29 01:22:18.193173 systemd-networkd[1079]: vxlan.calico: Gained carrier Oct 29 01:22:18.206336 kubelet[1614]: E1029 01:22:18.206312 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit: BPF prog-id=89 op=LOAD Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda42fcfe0 a2=98 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit: BPF prog-id=89 op=UNLOAD Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit: BPF prog-id=90 op=LOAD Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda42fcdf0 a2=94 a3=54428f items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit: BPF prog-id=90 op=UNLOAD Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit: BPF prog-id=91 op=LOAD Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda42fce20 a2=94 a3=2 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit: BPF prog-id=91 op=UNLOAD Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda42fccf0 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda42fcd20 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda42fcc30 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda42fcd40 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda42fcd20 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda42fcd10 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda42fcd40 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda42fcd20 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda42fcd40 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda42fcd10 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda42fcd80 a2=28 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.222000 audit: BPF prog-id=92 op=LOAD Oct 29 01:22:18.222000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda42fcbf0 a2=94 a3=0 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.222000 audit: BPF prog-id=92 op=UNLOAD Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffda42fcbe0 a2=50 a3=2800 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.223000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffda42fcbe0 a2=50 a3=2800 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.223000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit: BPF prog-id=93 op=LOAD Oct 29 01:22:18.223000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda42fc400 a2=94 a3=2 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.223000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.223000 audit: BPF prog-id=93 op=UNLOAD Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.223000 audit: BPF prog-id=94 op=LOAD Oct 29 01:22:18.223000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda42fc500 a2=94 a3=30 items=0 ppid=2269 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.223000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit: BPF prog-id=95 op=LOAD Oct 29 01:22:18.226000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffc95e8a50 a2=98 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.226000 audit: BPF prog-id=95 op=UNLOAD Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit: BPF prog-id=96 op=LOAD Oct 29 01:22:18.226000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc95e8840 a2=94 a3=54428f items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.226000 audit: BPF prog-id=96 op=UNLOAD Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.226000 audit: BPF prog-id=97 op=LOAD Oct 29 01:22:18.226000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc95e8870 a2=94 a3=2 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.226000 audit: BPF prog-id=97 op=UNLOAD Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit: BPF prog-id=98 op=LOAD Oct 29 01:22:18.315000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc95e8730 a2=94 a3=1 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.315000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.315000 audit: BPF prog-id=98 op=UNLOAD Oct 29 01:22:18.315000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.315000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffc95e8800 a2=50 a3=7fffc95e88e0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.315000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.323000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.323000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc95e8740 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.323000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.323000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc95e8770 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.323000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.323000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc95e8680 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.323000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.323000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc95e8790 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.323000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.323000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc95e8770 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.324000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.324000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc95e8760 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.324000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.324000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.324000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc95e8790 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.324000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.324000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.324000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc95e8770 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.324000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.324000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.324000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc95e8790 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.324000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.324000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.324000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc95e8760 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.324000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.324000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.324000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc95e87d0 a2=28 a3=0 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.324000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffc95e8580 a2=50 a3=1 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.325000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit: BPF prog-id=99 op=LOAD Oct 29 01:22:18.325000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffc95e8580 a2=94 a3=5 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.325000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.325000 audit: BPF prog-id=99 op=UNLOAD Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffc95e8630 a2=50 a3=1 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.325000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.325000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.325000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffc95e8750 a2=4 a3=38 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.325000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { confidentiality } for pid=2416 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:18.326000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc95e87a0 a2=94 a3=6 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.326000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.326000 audit[2416]: AVC avc: denied { confidentiality } for pid=2416 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:18.326000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc95e7f50 a2=94 a3=88 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.326000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { confidentiality } for pid=2416 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:18.327000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc95e7f50 a2=94 a3=88 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.327000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.327000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.327000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc95e9980 a2=10 a3=f8f00800 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.327000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.328000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.328000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc95e9820 a2=10 a3=3 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.328000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.328000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.328000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc95e97c0 a2=10 a3=3 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.328000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.328000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:18.328000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc95e97c0 a2=10 a3=7 items=0 ppid=2269 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.328000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 01:22:18.334000 audit: BPF prog-id=94 op=UNLOAD Oct 29 01:22:18.378000 audit[2439]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:18.378000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd06f8a9a0 a2=0 a3=7ffd06f8a98c items=0 ppid=2269 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.378000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:18.385000 audit[2442]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:18.385000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff865cbc00 a2=0 a3=7fff865cbbec items=0 ppid=2269 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.385000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:18.387000 audit[2441]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:18.387000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc1fddd950 a2=0 a3=7ffc1fddd93c items=0 ppid=2269 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.387000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:18.388000 audit[2440]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:18.388000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff17f18bd0 a2=0 a3=7fff17f18bbc items=0 ppid=2269 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:18.388000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:19.206475 kubelet[1614]: E1029 01:22:19.206408 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:19.308242 systemd-networkd[1079]: vxlan.calico: Gained IPv6LL Oct 29 01:22:20.195605 kubelet[1614]: E1029 01:22:20.195524 1614 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:20.207123 kubelet[1614]: E1029 01:22:20.207088 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:21.207979 kubelet[1614]: E1029 01:22:21.207938 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:22.208944 kubelet[1614]: E1029 01:22:22.208893 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:23.209689 kubelet[1614]: E1029 01:22:23.209663 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:24.210228 kubelet[1614]: E1029 01:22:24.210190 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:24.591663 kubelet[1614]: I1029 01:22:24.591131 1614 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 29 01:22:24.601241 systemd[1]: run-containerd-runc-k8s.io-667aa27409239fa0d11881e64f131911f66664a618384a08cab699cd56d069af-runc.nVRmG4.mount: Deactivated successfully. Oct 29 01:22:24.673719 kubelet[1614]: I1029 01:22:24.673681 1614 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-h6rcc" podStartSLOduration=11.307677857 podStartE2EDuration="24.673670441s" podCreationTimestamp="2025-10-29 01:22:00 +0000 UTC" firstStartedPulling="2025-10-29 01:22:03.130637171 +0000 UTC m=+3.482930929" lastFinishedPulling="2025-10-29 01:22:16.496629749 +0000 UTC m=+16.848923513" observedRunningTime="2025-10-29 01:22:17.437004873 +0000 UTC m=+17.789298644" watchObservedRunningTime="2025-10-29 01:22:24.673670441 +0000 UTC m=+25.025964206" Oct 29 01:22:25.210899 kubelet[1614]: E1029 01:22:25.210856 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:25.598708 systemd[1]: run-containerd-runc-k8s.io-667aa27409239fa0d11881e64f131911f66664a618384a08cab699cd56d069af-runc.K0GWRU.mount: Deactivated successfully. Oct 29 01:22:26.211264 kubelet[1614]: E1029 01:22:26.211223 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:26.390173 env[1271]: time="2025-10-29T01:22:26.390126944Z" level=info msg="StopPodSandbox for \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\"" Oct 29 01:22:26.390431 env[1271]: time="2025-10-29T01:22:26.390082218Z" level=info msg="StopPodSandbox for \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\"" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.487 [INFO][2523] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.487 [INFO][2523] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" iface="eth0" netns="/var/run/netns/cni-faf09c22-2099-c8e9-a3ba-55b76a29b21a" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.488 [INFO][2523] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" iface="eth0" netns="/var/run/netns/cni-faf09c22-2099-c8e9-a3ba-55b76a29b21a" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.490 [INFO][2523] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" iface="eth0" netns="/var/run/netns/cni-faf09c22-2099-c8e9-a3ba-55b76a29b21a" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.490 [INFO][2523] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.490 [INFO][2523] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.750 [INFO][2538] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" HandleID="k8s-pod-network.a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Workload="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.750 [INFO][2538] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.750 [INFO][2538] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.756 [WARNING][2538] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" HandleID="k8s-pod-network.a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Workload="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.756 [INFO][2538] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" HandleID="k8s-pod-network.a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Workload="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.757 [INFO][2538] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 01:22:26.760059 env[1271]: 2025-10-29 01:22:26.759 [INFO][2523] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda" Oct 29 01:22:26.761356 systemd[1]: run-netns-cni\x2dfaf09c22\x2d2099\x2dc8e9\x2da3ba\x2d55b76a29b21a.mount: Deactivated successfully. Oct 29 01:22:26.762277 env[1271]: time="2025-10-29T01:22:26.761886953Z" level=info msg="TearDown network for sandbox \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\" successfully" Oct 29 01:22:26.762277 env[1271]: time="2025-10-29T01:22:26.761916467Z" level=info msg="StopPodSandbox for \"a1c4531d841c786fe086b772a2086e592d5403bf4180a5af5e5a5eb09d15ebda\" returns successfully" Oct 29 01:22:26.763996 env[1271]: time="2025-10-29T01:22:26.763978504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-vv6n7,Uid:53650f20-c9a9-4e13-aeee-ad07ec9b1052,Namespace:default,Attempt:1,}" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.490 [INFO][2524] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.490 [INFO][2524] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" iface="eth0" netns="/var/run/netns/cni-2a6d219a-8a9f-4642-3dd4-d198e31aa883" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.490 [INFO][2524] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" iface="eth0" netns="/var/run/netns/cni-2a6d219a-8a9f-4642-3dd4-d198e31aa883" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.490 [INFO][2524] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" iface="eth0" netns="/var/run/netns/cni-2a6d219a-8a9f-4642-3dd4-d198e31aa883" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.490 [INFO][2524] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.490 [INFO][2524] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.750 [INFO][2536] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" HandleID="k8s-pod-network.fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Workload="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.750 [INFO][2536] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.757 [INFO][2536] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.765 [WARNING][2536] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" HandleID="k8s-pod-network.fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Workload="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.765 [INFO][2536] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" HandleID="k8s-pod-network.fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Workload="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.766 [INFO][2536] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 01:22:26.768882 env[1271]: 2025-10-29 01:22:26.767 [INFO][2524] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c" Oct 29 01:22:26.770719 systemd[1]: run-netns-cni\x2d2a6d219a\x2d8a9f\x2d4642\x2d3dd4\x2dd198e31aa883.mount: Deactivated successfully. Oct 29 01:22:26.771351 env[1271]: time="2025-10-29T01:22:26.771105350Z" level=info msg="TearDown network for sandbox \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\" successfully" Oct 29 01:22:26.771433 env[1271]: time="2025-10-29T01:22:26.771418847Z" level=info msg="StopPodSandbox for \"fc53feab69913310bcb03d1a42c9fd4efa74c0006294eab46532743c2e91b00c\" returns successfully" Oct 29 01:22:26.772604 env[1271]: time="2025-10-29T01:22:26.772585920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-prhdl,Uid:5211ee36-d1d8-4e33-9939-d7954fab6be6,Namespace:calico-system,Attempt:1,}" Oct 29 01:22:27.114220 systemd-networkd[1079]: calic33b0b2ebe6: Link UP Oct 29 01:22:27.116690 systemd-networkd[1079]: calic33b0b2ebe6: Gained carrier Oct 29 01:22:27.117179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic33b0b2ebe6: link becomes ready Oct 29 01:22:27.118476 systemd-networkd[1079]: cali317e2b64828: Link UP Oct 29 01:22:27.120547 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 01:22:27.120605 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali317e2b64828: link becomes ready Oct 29 01:22:27.120603 systemd-networkd[1079]: cali317e2b64828: Gained carrier Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:26.816 [INFO][2562] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.134-k8s-csi--node--driver--prhdl-eth0 csi-node-driver- calico-system 5211ee36-d1d8-4e33-9939-d7954fab6be6 1445 0 2025-10-29 01:22:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:9d99788f7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.134 csi-node-driver-prhdl eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic33b0b2ebe6 [] [] }} ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:26.816 [INFO][2562] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:26.839 [INFO][2580] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" HandleID="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Workload="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:26.839 [INFO][2580] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" HandleID="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Workload="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002defe0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.134", "pod":"csi-node-driver-prhdl", "timestamp":"2025-10-29 01:22:26.839532657 +0000 UTC"}, Hostname:"10.67.124.134", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:26.839 [INFO][2580] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.035 [INFO][2580] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.035 [INFO][2580] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.134' Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.041 [INFO][2580] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.043 [INFO][2580] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.066 [INFO][2580] ipam/ipam.go 511: Trying affinity for 192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.067 [INFO][2580] ipam/ipam.go 158: Attempting to load block cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.069 [INFO][2580] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.069 [INFO][2580] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.116.128/26 handle="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.070 [INFO][2580] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.103 [INFO][2580] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.116.128/26 handle="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.106 [INFO][2580] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.116.130/26] block=192.168.116.128/26 handle="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.106 [INFO][2580] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.116.130/26] handle="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" host="10.67.124.134" Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.106 [INFO][2580] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 01:22:27.169752 env[1271]: 2025-10-29 01:22:27.106 [INFO][2580] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.116.130/26] IPv6=[] ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" HandleID="k8s-pod-network.31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Workload="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:27.170248 env[1271]: 2025-10-29 01:22:27.107 [INFO][2562] cni-plugin/k8s.go 418: Populated endpoint ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-csi--node--driver--prhdl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5211ee36-d1d8-4e33-9939-d7954fab6be6", ResourceVersion:"1445", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"", Pod:"csi-node-driver-prhdl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.116.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic33b0b2ebe6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:27.170248 env[1271]: 2025-10-29 01:22:27.107 [INFO][2562] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.116.130/32] ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:27.170248 env[1271]: 2025-10-29 01:22:27.107 [INFO][2562] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic33b0b2ebe6 ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:27.170248 env[1271]: 2025-10-29 01:22:27.142 [INFO][2562] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:27.170248 env[1271]: 2025-10-29 01:22:27.142 [INFO][2562] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-csi--node--driver--prhdl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5211ee36-d1d8-4e33-9939-d7954fab6be6", ResourceVersion:"1445", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc", Pod:"csi-node-driver-prhdl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.116.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic33b0b2ebe6", MAC:"72:46:65:f7:08:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:27.170248 env[1271]: 2025-10-29 01:22:27.167 [INFO][2562] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc" Namespace="calico-system" Pod="csi-node-driver-prhdl" WorkloadEndpoint="10.67.124.134-k8s-csi--node--driver--prhdl-eth0" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.807 [INFO][2549] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0 nginx-deployment-bb8f74bfb- default 53650f20-c9a9-4e13-aeee-ad07ec9b1052 1444 0 2025-10-29 01:22:12 +0000 UTC map[app:nginx pod-template-hash:bb8f74bfb projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.134 nginx-deployment-bb8f74bfb-vv6n7 eth0 default [] [] [kns.default ksa.default.default] cali317e2b64828 [] [] }} ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.808 [INFO][2549] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.831 [INFO][2575] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" HandleID="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Workload="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.831 [INFO][2575] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" HandleID="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Workload="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.134", "pod":"nginx-deployment-bb8f74bfb-vv6n7", "timestamp":"2025-10-29 01:22:26.831226604 +0000 UTC"}, Hostname:"10.67.124.134", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.831 [INFO][2575] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.831 [INFO][2575] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.831 [INFO][2575] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.134' Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.840 [INFO][2575] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.959 [INFO][2575] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.964 [INFO][2575] ipam/ipam.go 511: Trying affinity for 192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.966 [INFO][2575] ipam/ipam.go 158: Attempting to load block cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.967 [INFO][2575] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.967 [INFO][2575] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.116.128/26 handle="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.971 [INFO][2575] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:26.997 [INFO][2575] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.116.128/26 handle="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:27.035 [INFO][2575] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.116.129/26] block=192.168.116.128/26 handle="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:27.035 [INFO][2575] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.116.129/26] handle="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" host="10.67.124.134" Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:27.035 [INFO][2575] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 01:22:27.176427 env[1271]: 2025-10-29 01:22:27.035 [INFO][2575] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.116.129/26] IPv6=[] ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" HandleID="k8s-pod-network.59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Workload="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:27.176974 env[1271]: 2025-10-29 01:22:27.037 [INFO][2549] cni-plugin/k8s.go 418: Populated endpoint ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"53650f20-c9a9-4e13-aeee-ad07ec9b1052", ResourceVersion:"1444", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"", Pod:"nginx-deployment-bb8f74bfb-vv6n7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali317e2b64828", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:27.176974 env[1271]: 2025-10-29 01:22:27.037 [INFO][2549] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.116.129/32] ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:27.176974 env[1271]: 2025-10-29 01:22:27.037 [INFO][2549] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali317e2b64828 ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:27.176974 env[1271]: 2025-10-29 01:22:27.142 [INFO][2549] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:27.176974 env[1271]: 2025-10-29 01:22:27.142 [INFO][2549] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0", GenerateName:"nginx-deployment-bb8f74bfb-", Namespace:"default", SelfLink:"", UID:"53650f20-c9a9-4e13-aeee-ad07ec9b1052", ResourceVersion:"1444", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"bb8f74bfb", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a", Pod:"nginx-deployment-bb8f74bfb-vv6n7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali317e2b64828", MAC:"da:28:3c:51:57:02", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:27.176974 env[1271]: 2025-10-29 01:22:27.174 [INFO][2549] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a" Namespace="default" Pod="nginx-deployment-bb8f74bfb-vv6n7" WorkloadEndpoint="10.67.124.134-k8s-nginx--deployment--bb8f74bfb--vv6n7-eth0" Oct 29 01:22:27.184682 env[1271]: time="2025-10-29T01:22:27.184625966Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 01:22:27.186597 env[1271]: time="2025-10-29T01:22:27.184768189Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 01:22:27.186597 env[1271]: time="2025-10-29T01:22:27.184795449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 01:22:27.186597 env[1271]: time="2025-10-29T01:22:27.184914553Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc pid=2617 runtime=io.containerd.runc.v2 Oct 29 01:22:27.195438 systemd[1]: Started cri-containerd-31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc.scope. Oct 29 01:22:27.200701 env[1271]: time="2025-10-29T01:22:27.200660180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 01:22:27.200850 env[1271]: time="2025-10-29T01:22:27.200835118Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 01:22:27.200919 env[1271]: time="2025-10-29T01:22:27.200904730Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 01:22:27.201136 env[1271]: time="2025-10-29T01:22:27.201118543Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a pid=2645 runtime=io.containerd.runc.v2 Oct 29 01:22:27.186000 audit[2603]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:27.210235 kernel: kauditd_printk_skb: 590 callbacks suppressed Oct 29 01:22:27.210278 kernel: audit: type=1325 audit(1761700947.186:646): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:27.211453 kubelet[1614]: E1029 01:22:27.211426 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:27.186000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7fffc73b5720 a2=0 a3=7fffc73b570c items=0 ppid=2269 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.216886 kernel: audit: type=1300 audit(1761700947.186:646): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7fffc73b5720 a2=0 a3=7fffc73b570c items=0 ppid=2269 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.217420 kernel: audit: type=1327 audit(1761700947.186:646): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:27.186000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:27.223013 systemd[1]: Started cri-containerd-59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a.scope. Oct 29 01:22:27.223911 systemd-resolved[1220]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.227099 kernel: audit: type=1400 audit(1761700947.218:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.231130 kernel: audit: type=1400 audit(1761700947.218:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.236118 kernel: audit: type=1400 audit(1761700947.218:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241974 kernel: audit: type=1400 audit(1761700947.218:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.242043 kernel: audit: type=1400 audit(1761700947.218:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.244524 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 29 01:22:27.244595 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 29 01:22:27.247134 systemd-resolved[1220]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit: BPF prog-id=100 op=LOAD Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636134393937313536663730306537616435353939323933303938 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636134393937313536663730306537616435353939323933303938 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit: BPF prog-id=101 op=LOAD Oct 29 01:22:27.219000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024cb60 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636134393937313536663730306537616435353939323933303938 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.219000 audit: BPF prog-id=102 op=LOAD Oct 29 01:22:27.219000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024cba8 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636134393937313536663730306537616435353939323933303938 Oct 29 01:22:27.219000 audit: BPF prog-id=102 op=UNLOAD Oct 29 01:22:27.219000 audit: BPF prog-id=101 op=UNLOAD Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.220000 audit: BPF prog-id=103 op=LOAD Oct 29 01:22:27.220000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024cfb8 items=0 ppid=2617 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331636134393937313536663730306537616435353939323933303938 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:27.254215 env[1271]: time="2025-10-29T01:22:27.254187400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-prhdl,Uid:5211ee36-d1d8-4e33-9939-d7954fab6be6,Namespace:calico-system,Attempt:1,} returns sandbox id \"31ca4997156f700e7ad55992930989ec87bf82a906c4c2864006bee791e627bc\"" Oct 29 01:22:27.257575 env[1271]: time="2025-10-29T01:22:27.257555247Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 01:22:27.257000 audit[2688]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:27.257000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fff9f5c2f80 a2=0 a3=7fff9f5c2f6c items=0 ppid=2269 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:27.257000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:27.274369 env[1271]: time="2025-10-29T01:22:27.274341783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-bb8f74bfb-vv6n7,Uid:53650f20-c9a9-4e13-aeee-ad07ec9b1052,Namespace:default,Attempt:1,} returns sandbox id \"59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a\"" Oct 29 01:22:27.648968 env[1271]: time="2025-10-29T01:22:27.648930110Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 01:22:27.652055 env[1271]: time="2025-10-29T01:22:27.652009416Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 01:22:27.652577 kubelet[1614]: E1029 01:22:27.652311 1614 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 01:22:27.652577 kubelet[1614]: E1029 01:22:27.652345 1614 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 01:22:27.652577 kubelet[1614]: E1029 01:22:27.652497 1614 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-prhdl_calico-system(5211ee36-d1d8-4e33-9939-d7954fab6be6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 01:22:27.652886 env[1271]: time="2025-10-29T01:22:27.652861207Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 29 01:22:28.211758 kubelet[1614]: E1029 01:22:28.211702 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:28.332285 systemd-networkd[1079]: cali317e2b64828: Gained IPv6LL Oct 29 01:22:28.461191 systemd-networkd[1079]: calic33b0b2ebe6: Gained IPv6LL Oct 29 01:22:29.212320 kubelet[1614]: E1029 01:22:29.212279 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:30.213344 kubelet[1614]: E1029 01:22:30.213308 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:30.443517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount371406495.mount: Deactivated successfully. Oct 29 01:22:31.213640 kubelet[1614]: E1029 01:22:31.213609 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:31.626365 env[1271]: time="2025-10-29T01:22:31.626337272Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:31.627435 env[1271]: time="2025-10-29T01:22:31.627415984Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:31.628482 env[1271]: time="2025-10-29T01:22:31.628463520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:31.629784 env[1271]: time="2025-10-29T01:22:31.629765467Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:31.630315 env[1271]: time="2025-10-29T01:22:31.630295707Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 29 01:22:31.631490 env[1271]: time="2025-10-29T01:22:31.631474530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 01:22:31.632789 env[1271]: time="2025-10-29T01:22:31.632768602Z" level=info msg="CreateContainer within sandbox \"59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 29 01:22:31.639112 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount961297411.mount: Deactivated successfully. Oct 29 01:22:31.642223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1714403847.mount: Deactivated successfully. Oct 29 01:22:31.646451 env[1271]: time="2025-10-29T01:22:31.646423944Z" level=info msg="CreateContainer within sandbox \"59bc3537944bb0026fb986be35d0aaeb5003871d4dde6e5144e0d5b89b57d56a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"27b5ebc38fde7353d6776d83f4d10327257bc7e5e8d087e6b7db67c95313bc1c\"" Oct 29 01:22:31.647078 env[1271]: time="2025-10-29T01:22:31.647053079Z" level=info msg="StartContainer for \"27b5ebc38fde7353d6776d83f4d10327257bc7e5e8d087e6b7db67c95313bc1c\"" Oct 29 01:22:31.663743 systemd[1]: Started cri-containerd-27b5ebc38fde7353d6776d83f4d10327257bc7e5e8d087e6b7db67c95313bc1c.scope. Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.676000 audit: BPF prog-id=108 op=LOAD Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2645 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:31.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623565626333386664653733353364363737366438336634643130 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2645 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:31.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623565626333386664653733353364363737366438336634643130 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.677000 audit: BPF prog-id=109 op=LOAD Oct 29 01:22:31.677000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000fbdc0 items=0 ppid=2645 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:31.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623565626333386664653733353364363737366438336634643130 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.678000 audit: BPF prog-id=110 op=LOAD Oct 29 01:22:31.678000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000fbe08 items=0 ppid=2645 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:31.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623565626333386664653733353364363737366438336634643130 Oct 29 01:22:31.678000 audit: BPF prog-id=110 op=UNLOAD Oct 29 01:22:31.679000 audit: BPF prog-id=109 op=UNLOAD Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { perfmon } for pid=2709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit[2709]: AVC avc: denied { bpf } for pid=2709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:31.679000 audit: BPF prog-id=111 op=LOAD Oct 29 01:22:31.679000 audit[2709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003dc218 items=0 ppid=2645 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:31.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623565626333386664653733353364363737366438336634643130 Oct 29 01:22:31.692119 env[1271]: time="2025-10-29T01:22:31.692076862Z" level=info msg="StartContainer for \"27b5ebc38fde7353d6776d83f4d10327257bc7e5e8d087e6b7db67c95313bc1c\" returns successfully" Oct 29 01:22:32.103751 env[1271]: time="2025-10-29T01:22:32.103671672Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 01:22:32.174923 env[1271]: time="2025-10-29T01:22:32.174722615Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 01:22:32.175038 kubelet[1614]: E1029 01:22:32.174907 1614 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 01:22:32.175038 kubelet[1614]: E1029 01:22:32.174935 1614 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 01:22:32.175038 kubelet[1614]: E1029 01:22:32.174993 1614 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-prhdl_calico-system(5211ee36-d1d8-4e33-9939-d7954fab6be6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 01:22:32.175164 kubelet[1614]: E1029 01:22:32.175029 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:32.213947 kubelet[1614]: E1029 01:22:32.213915 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:32.452160 kubelet[1614]: E1029 01:22:32.451779 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:33.225787 kubelet[1614]: E1029 01:22:33.225761 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:34.226925 kubelet[1614]: E1029 01:22:34.226890 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:35.227567 kubelet[1614]: E1029 01:22:35.227535 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:36.228717 kubelet[1614]: E1029 01:22:36.228690 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:36.317000 audit[2761]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:36.321237 kernel: kauditd_printk_skb: 233 callbacks suppressed Oct 29 01:22:36.321301 kernel: audit: type=1325 audit(1761700956.317:693): table=filter:71 family=2 entries=26 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:36.317000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffcc80743f0 a2=0 a3=7ffcc80743dc items=0 ppid=1779 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:36.326913 kernel: audit: type=1300 audit(1761700956.317:693): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffcc80743f0 a2=0 a3=7ffcc80743dc items=0 ppid=1779 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:36.326955 kernel: audit: type=1327 audit(1761700956.317:693): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:36.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:36.326000 audit[2761]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:36.330362 kernel: audit: type=1325 audit(1761700956.326:694): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:36.330398 kernel: audit: type=1300 audit(1761700956.326:694): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc80743f0 a2=0 a3=0 items=0 ppid=1779 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:36.326000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc80743f0 a2=0 a3=0 items=0 ppid=1779 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:36.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:36.335781 kernel: audit: type=1327 audit(1761700956.326:694): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:36.535689 kubelet[1614]: I1029 01:22:36.535637 1614 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-bb8f74bfb-vv6n7" podStartSLOduration=20.179730098 podStartE2EDuration="24.535624559s" podCreationTimestamp="2025-10-29 01:22:12 +0000 UTC" firstStartedPulling="2025-10-29 01:22:27.275052524 +0000 UTC m=+27.627346283" lastFinishedPulling="2025-10-29 01:22:31.630946986 +0000 UTC m=+31.983240744" observedRunningTime="2025-10-29 01:22:32.478024461 +0000 UTC m=+32.830318219" watchObservedRunningTime="2025-10-29 01:22:36.535624559 +0000 UTC m=+36.887918317" Oct 29 01:22:36.540123 systemd[1]: Created slice kubepods-besteffort-pod0215a0fb_924d_4658_84d0_56bf7dcaf910.slice. Oct 29 01:22:36.615891 kubelet[1614]: I1029 01:22:36.615862 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/0215a0fb-924d-4658-84d0-56bf7dcaf910-data\") pod \"nfs-server-provisioner-0\" (UID: \"0215a0fb-924d-4658-84d0-56bf7dcaf910\") " pod="default/nfs-server-provisioner-0" Oct 29 01:22:36.616030 kubelet[1614]: I1029 01:22:36.616019 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p6w94\" (UniqueName: \"kubernetes.io/projected/0215a0fb-924d-4658-84d0-56bf7dcaf910-kube-api-access-p6w94\") pod \"nfs-server-provisioner-0\" (UID: \"0215a0fb-924d-4658-84d0-56bf7dcaf910\") " pod="default/nfs-server-provisioner-0" Oct 29 01:22:36.844234 env[1271]: time="2025-10-29T01:22:36.843836458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0215a0fb-924d-4658-84d0-56bf7dcaf910,Namespace:default,Attempt:0,}" Oct 29 01:22:36.968772 systemd-networkd[1079]: cali60e51b789ff: Link UP Oct 29 01:22:36.970944 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 01:22:36.970999 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 29 01:22:36.971297 systemd-networkd[1079]: cali60e51b789ff: Gained carrier Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.875 [INFO][2764] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.134-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 0215a0fb-924d-4658-84d0-56bf7dcaf910 1523 0 2025-10-29 01:22:36 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-7c9b4c458c heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.134 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.875 [INFO][2764] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.903 [INFO][2778] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" HandleID="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Workload="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.903 [INFO][2778] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" HandleID="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Workload="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002511c0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.134", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-29 01:22:36.903558286 +0000 UTC"}, Hostname:"10.67.124.134", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.903 [INFO][2778] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.903 [INFO][2778] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.903 [INFO][2778] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.134' Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.911 [INFO][2778] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.913 [INFO][2778] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.921 [INFO][2778] ipam/ipam.go 511: Trying affinity for 192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.922 [INFO][2778] ipam/ipam.go 158: Attempting to load block cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.940 [INFO][2778] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.940 [INFO][2778] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.116.128/26 handle="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.941 [INFO][2778] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.944 [INFO][2778] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.116.128/26 handle="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.964 [INFO][2778] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.116.131/26] block=192.168.116.128/26 handle="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.964 [INFO][2778] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.116.131/26] handle="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" host="10.67.124.134" Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.964 [INFO][2778] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 01:22:36.991187 env[1271]: 2025-10-29 01:22:36.964 [INFO][2778] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.116.131/26] IPv6=[] ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" HandleID="k8s-pod-network.fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Workload="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" Oct 29 01:22:36.991673 env[1271]: 2025-10-29 01:22:36.965 [INFO][2764] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0215a0fb-924d-4658-84d0-56bf7dcaf910", ResourceVersion:"1523", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.116.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:36.991673 env[1271]: 2025-10-29 01:22:36.965 [INFO][2764] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.116.131/32] ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" Oct 29 01:22:36.991673 env[1271]: 2025-10-29 01:22:36.965 [INFO][2764] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" Oct 29 01:22:36.991673 env[1271]: 2025-10-29 01:22:36.969 [INFO][2764] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" Oct 29 01:22:36.991794 env[1271]: 2025-10-29 01:22:36.971 [INFO][2764] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"0215a0fb-924d-4658-84d0-56bf7dcaf910", ResourceVersion:"1523", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-7c9b4c458c", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.116.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"42:e9:3a:e2:b6:7a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:36.991794 env[1271]: 2025-10-29 01:22:36.990 [INFO][2764] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.134-k8s-nfs--server--provisioner--0-eth0" Oct 29 01:22:37.048400 env[1271]: time="2025-10-29T01:22:37.048279492Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 01:22:37.048400 env[1271]: time="2025-10-29T01:22:37.048305957Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 01:22:37.048400 env[1271]: time="2025-10-29T01:22:37.048317121Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 01:22:37.048583 env[1271]: time="2025-10-29T01:22:37.048417266Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f pid=2799 runtime=io.containerd.runc.v2 Oct 29 01:22:37.059900 systemd[1]: Started cri-containerd-fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f.scope. Oct 29 01:22:37.181365 kernel: audit: type=1400 audit(1761700957.072:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.181432 kernel: audit: type=1400 audit(1761700957.072:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.181450 kernel: audit: type=1400 audit(1761700957.072:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.181466 kernel: audit: type=1400 audit(1761700957.072:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit: BPF prog-id=112 op=LOAD Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306638616565343335383932653438313137396363333236313164 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306638616565343335383932653438313137396363333236313164 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.072000 audit: BPF prog-id=113 op=LOAD Oct 29 01:22:37.072000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000243dc0 items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306638616565343335383932653438313137396363333236313164 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.074000 audit: BPF prog-id=114 op=LOAD Oct 29 01:22:37.074000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000243e08 items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306638616565343335383932653438313137396363333236313164 Oct 29 01:22:37.077000 audit: BPF prog-id=114 op=UNLOAD Oct 29 01:22:37.077000 audit: BPF prog-id=113 op=UNLOAD Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:37.077000 audit: BPF prog-id=115 op=LOAD Oct 29 01:22:37.077000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ba218 items=0 ppid=2799 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306638616565343335383932653438313137396363333236313164 Oct 29 01:22:37.144000 audit[2837]: NETFILTER_CFG table=filter:73 family=2 entries=40 op=nft_register_chain pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:37.144000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffdb5bf9640 a2=0 a3=7ffdb5bf962c items=0 ppid=2269 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.144000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:37.083730 systemd-resolved[1220]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 01:22:37.186075 env[1271]: time="2025-10-29T01:22:37.104351657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:0215a0fb-924d-4658-84d0-56bf7dcaf910,Namespace:default,Attempt:0,} returns sandbox id \"fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f\"" Oct 29 01:22:37.186075 env[1271]: time="2025-10-29T01:22:37.105499172Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 29 01:22:37.230027 kubelet[1614]: E1029 01:22:37.229993 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:37.342000 audit[2839]: NETFILTER_CFG table=filter:74 family=2 entries=38 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:37.342000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe9e1c2a10 a2=0 a3=7ffe9e1c29fc items=0 ppid=1779 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:37.347000 audit[2839]: NETFILTER_CFG table=nat:75 family=2 entries=20 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:37.347000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe9e1c2a10 a2=0 a3=0 items=0 ppid=1779 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:37.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:38.230480 kubelet[1614]: E1029 01:22:38.230443 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:39.020318 systemd-networkd[1079]: cali60e51b789ff: Gained IPv6LL Oct 29 01:22:39.231477 kubelet[1614]: E1029 01:22:39.231452 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:40.030490 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2645576292.mount: Deactivated successfully. Oct 29 01:22:40.195407 kubelet[1614]: E1029 01:22:40.195377 1614 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:40.232012 kubelet[1614]: E1029 01:22:40.231979 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:41.232107 kubelet[1614]: E1029 01:22:41.232043 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:41.679465 env[1271]: time="2025-10-29T01:22:41.679295142Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:41.687076 env[1271]: time="2025-10-29T01:22:41.687039518Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:41.694887 env[1271]: time="2025-10-29T01:22:41.694853424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:41.699990 env[1271]: time="2025-10-29T01:22:41.699969570Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:41.700453 env[1271]: time="2025-10-29T01:22:41.700435059Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Oct 29 01:22:41.724845 env[1271]: time="2025-10-29T01:22:41.724818224Z" level=info msg="CreateContainer within sandbox \"fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 29 01:22:41.744846 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1426031037.mount: Deactivated successfully. Oct 29 01:22:41.748221 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2871430811.mount: Deactivated successfully. Oct 29 01:22:41.791769 env[1271]: time="2025-10-29T01:22:41.791737417Z" level=info msg="CreateContainer within sandbox \"fc0f8aee435892e481179cc32611dbd89334fe6bd1f17b63ebf2189a6e63f71f\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"db55d9d149df1a10d7e066092095ff1a13d63360358fd95b5c680a8590c38470\"" Oct 29 01:22:41.792260 env[1271]: time="2025-10-29T01:22:41.792246997Z" level=info msg="StartContainer for \"db55d9d149df1a10d7e066092095ff1a13d63360358fd95b5c680a8590c38470\"" Oct 29 01:22:41.820218 systemd[1]: Started cri-containerd-db55d9d149df1a10d7e066092095ff1a13d63360358fd95b5c680a8590c38470.scope. Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.840371 kernel: kauditd_printk_skb: 62 callbacks suppressed Oct 29 01:22:41.840491 kernel: audit: type=1400 audit(1761700961.835:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.843327 kernel: audit: type=1400 audit(1761700961.835:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.844272 kernel: audit: type=1400 audit(1761700961.835:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.849541 kernel: audit: type=1400 audit(1761700961.835:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.857033 kernel: audit: type=1400 audit(1761700961.835:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.857126 kernel: audit: type=1400 audit(1761700961.835:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.861349 kernel: audit: type=1400 audit(1761700961.835:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.864308 kernel: audit: type=1400 audit(1761700961.835:723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.869844 kernel: audit: type=1400 audit(1761700961.835:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.869895 kernel: audit: type=1400 audit(1761700961.836:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit: BPF prog-id=116 op=LOAD Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2799 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:41.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353564396431343964663161313064376530363630393230393566 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2799 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:41.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353564396431343964663161313064376530363630393230393566 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.836000 audit: BPF prog-id=117 op=LOAD Oct 29 01:22:41.836000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002826a0 items=0 ppid=2799 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:41.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353564396431343964663161313064376530363630393230393566 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit: BPF prog-id=118 op=LOAD Oct 29 01:22:41.839000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002826e8 items=0 ppid=2799 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:41.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353564396431343964663161313064376530363630393230393566 Oct 29 01:22:41.839000 audit: BPF prog-id=118 op=UNLOAD Oct 29 01:22:41.839000 audit: BPF prog-id=117 op=UNLOAD Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { perfmon } for pid=2854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit[2854]: AVC avc: denied { bpf } for pid=2854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:41.839000 audit: BPF prog-id=119 op=LOAD Oct 29 01:22:41.839000 audit[2854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000282af8 items=0 ppid=2799 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:41.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462353564396431343964663161313064376530363630393230393566 Oct 29 01:22:41.885125 env[1271]: time="2025-10-29T01:22:41.877295195Z" level=info msg="StartContainer for \"db55d9d149df1a10d7e066092095ff1a13d63360358fd95b5c680a8590c38470\" returns successfully" Oct 29 01:22:41.893000 audit[2881]: AVC avc: denied { search } for pid=2881 comm="rpcbind" name="crypto" dev="proc" ino=33789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 01:22:41.893000 audit[2881]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f99d071d0c0 a2=0 a3=0 items=0 ppid=2864 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 key=(null) Oct 29 01:22:41.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 29 01:22:41.935000 audit[2886]: AVC avc: denied { search } for pid=2886 comm="dbus-daemon" name="crypto" dev="proc" ino=33789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 01:22:41.935000 audit[2886]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe80a09b0c0 a2=0 a3=0 items=0 ppid=2864 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 key=(null) Oct 29 01:22:41.935000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 29 01:22:41.939000 audit[2887]: AVC avc: denied { watch } for pid=2887 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=528685 scontext=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c493,c997 tclass=dir permissive=0 Oct 29 01:22:41.939000 audit[2887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56153ee118c0 a2=2c8 a3=7ffc18e8517c items=0 ppid=2864 pid=2887 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 key=(null) Oct 29 01:22:41.939000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 29 01:22:41.946000 audit[2888]: AVC avc: denied { read } for pid=2888 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34838 scontext=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 29 01:22:41.946000 audit[2888]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f6dbb621320 a1=80000 a2=d a3=7fff5f89d600 items=0 ppid=2864 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 key=(null) Oct 29 01:22:41.946000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 29 01:22:41.947000 audit[2888]: AVC avc: denied { search } for pid=2888 comm="ganesha.nfsd" name="crypto" dev="proc" ino=33789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 01:22:41.947000 audit[2888]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6dbab750c0 a2=0 a3=0 items=0 ppid=2864 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c493,c997 key=(null) Oct 29 01:22:41.947000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 29 01:22:42.233163 kubelet[1614]: E1029 01:22:42.233079 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:42.488096 kubelet[1614]: I1029 01:22:42.487689 1614 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.89155159 podStartE2EDuration="6.487675255s" podCreationTimestamp="2025-10-29 01:22:36 +0000 UTC" firstStartedPulling="2025-10-29 01:22:37.105164437 +0000 UTC m=+37.457458198" lastFinishedPulling="2025-10-29 01:22:41.701288102 +0000 UTC m=+42.053581863" observedRunningTime="2025-10-29 01:22:42.487094115 +0000 UTC m=+42.839387874" watchObservedRunningTime="2025-10-29 01:22:42.487675255 +0000 UTC m=+42.839969023" Oct 29 01:22:42.618000 audit[2909]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:42.618000 audit[2909]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffffe8f5650 a2=0 a3=7ffffe8f563c items=0 ppid=1779 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:42.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:42.622000 audit[2909]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 01:22:42.622000 audit[2909]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffffe8f5650 a2=0 a3=7ffffe8f563c items=0 ppid=1779 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:42.622000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 01:22:43.233602 kubelet[1614]: E1029 01:22:43.233574 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:43.390963 env[1271]: time="2025-10-29T01:22:43.390930607Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 01:22:43.711731 env[1271]: time="2025-10-29T01:22:43.711696657Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 01:22:43.712180 env[1271]: time="2025-10-29T01:22:43.712146464Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 01:22:43.712416 kubelet[1614]: E1029 01:22:43.712390 1614 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 01:22:43.712458 kubelet[1614]: E1029 01:22:43.712423 1614 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 01:22:43.712514 kubelet[1614]: E1029 01:22:43.712497 1614 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-prhdl_calico-system(5211ee36-d1d8-4e33-9939-d7954fab6be6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 01:22:43.713286 env[1271]: time="2025-10-29T01:22:43.713267625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 01:22:44.169248 env[1271]: time="2025-10-29T01:22:44.169204077Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 01:22:44.169728 env[1271]: time="2025-10-29T01:22:44.169693918Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 01:22:44.170196 kubelet[1614]: E1029 01:22:44.169927 1614 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 01:22:44.170196 kubelet[1614]: E1029 01:22:44.169976 1614 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 01:22:44.170196 kubelet[1614]: E1029 01:22:44.170092 1614 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-prhdl_calico-system(5211ee36-d1d8-4e33-9939-d7954fab6be6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 01:22:44.170410 kubelet[1614]: E1029 01:22:44.170135 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6" Oct 29 01:22:44.234057 kubelet[1614]: E1029 01:22:44.234001 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:45.234810 kubelet[1614]: E1029 01:22:45.234785 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:46.235930 kubelet[1614]: E1029 01:22:46.235886 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:47.167143 systemd[1]: Created slice kubepods-besteffort-podfd5f20f3_3f5d_4e74_ba33_dccf547fd2ea.slice. Oct 29 01:22:47.236833 kubelet[1614]: E1029 01:22:47.236798 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:47.278093 kubelet[1614]: I1029 01:22:47.278043 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-e148aaac-d7df-46e5-b564-685da86b9c6c\" (UniqueName: \"kubernetes.io/nfs/fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea-pvc-e148aaac-d7df-46e5-b564-685da86b9c6c\") pod \"test-pod-1\" (UID: \"fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea\") " pod="default/test-pod-1" Oct 29 01:22:47.278093 kubelet[1614]: I1029 01:22:47.278096 1614 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-trxxm\" (UniqueName: \"kubernetes.io/projected/fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea-kube-api-access-trxxm\") pod \"test-pod-1\" (UID: \"fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea\") " pod="default/test-pod-1" Oct 29 01:22:47.408000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.414391 kernel: Failed to create system directory netfs Oct 29 01:22:47.414472 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 29 01:22:47.414495 kernel: audit: type=1400 audit(1761700967.408:741): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.414517 kernel: Failed to create system directory netfs Oct 29 01:22:47.414533 kernel: audit: type=1400 audit(1761700967.408:741): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.408000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.417726 kernel: Failed to create system directory netfs Oct 29 01:22:47.417771 kernel: audit: type=1400 audit(1761700967.408:741): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.408000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.421175 kernel: Failed to create system directory netfs Oct 29 01:22:47.421247 kernel: audit: type=1400 audit(1761700967.408:741): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.408000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.408000 audit[2917]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e5da125e0 a1=153bc a2=561e4470f2b0 a3=5 items=0 ppid=492 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:47.408000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 01:22:47.431723 kernel: audit: type=1300 audit(1761700967.408:741): arch=c000003e syscall=175 success=yes exit=0 a0=561e5da125e0 a1=153bc a2=561e4470f2b0 a3=5 items=0 ppid=492 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:47.431778 kernel: audit: type=1327 audit(1761700967.408:741): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.438673 kernel: Failed to create system directory fscache Oct 29 01:22:47.438719 kernel: audit: type=1400 audit(1761700967.431:742): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.438738 kernel: Failed to create system directory fscache Oct 29 01:22:47.438752 kernel: audit: type=1400 audit(1761700967.431:742): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.441979 kernel: Failed to create system directory fscache Oct 29 01:22:47.442043 kernel: audit: type=1400 audit(1761700967.431:742): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.445310 kernel: Failed to create system directory fscache Oct 29 01:22:47.445384 kernel: audit: type=1400 audit(1761700967.431:742): avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.448653 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.449408 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.450109 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.451470 kernel: Failed to create system directory fscache Oct 29 01:22:47.451496 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.452178 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.453542 kernel: Failed to create system directory fscache Oct 29 01:22:47.453563 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.454241 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.431000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.455080 kernel: Failed to create system directory fscache Oct 29 01:22:47.431000 audit[2917]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e5dc279c0 a1=4c0fc a2=561e4470f2b0 a3=5 items=0 ppid=492 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:47.431000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 01:22:47.457084 kernel: FS-Cache: Loaded Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.489530 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.489566 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.489581 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.490244 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.491592 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.491621 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.492334 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.493671 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.493698 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.494377 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.495094 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.496396 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.496422 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.497085 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.498437 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.498526 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.499232 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.500682 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.500729 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.501419 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.502143 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.503508 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.503536 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.504261 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.505640 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.505663 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.506338 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.507086 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.508435 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.508470 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.509207 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.510644 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.510678 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.511398 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.512141 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.513583 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.513613 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.514314 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.515091 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.516466 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.516492 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.517167 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.518538 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.518564 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.519275 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.520597 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.520623 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.521294 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.522619 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.523378 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.523401 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.524086 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.525434 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.525462 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.526132 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.527459 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.527486 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.528157 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.529496 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.529523 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.530188 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.531537 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.531565 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.532264 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.533616 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.533642 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.534318 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.535646 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.535673 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.536333 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.537161 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.538492 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.538517 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.539185 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.540526 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.540553 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.541220 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.542544 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.542571 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.543235 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.544556 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.544578 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.545249 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.546568 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.546593 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.547255 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.548603 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.548632 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.549317 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.550637 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.550662 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.551320 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.552632 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.552657 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.553319 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.554648 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.554673 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.555348 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.556679 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.556702 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.557378 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.558098 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.559422 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.559445 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.560152 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.561580 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.561612 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.562288 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.563623 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.563649 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.564345 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.565662 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.565687 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.566351 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.567671 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.567692 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.568364 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.569075 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.570370 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.570397 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.571092 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.572380 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.572406 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.573092 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.574385 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.574410 kernel: Failed to create system directory sunrpc Oct 29 01:22:47.477000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.582073 kernel: RPC: Registered named UNIX socket transport module. Oct 29 01:22:47.582141 kernel: RPC: Registered udp transport module. Oct 29 01:22:47.582158 kernel: RPC: Registered tcp transport module. Oct 29 01:22:47.582171 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 29 01:22:47.477000 audit[2917]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e5dc73ad0 a1=1a8274 a2=561e4470f2b0 a3=5 items=6 ppid=492 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:47.477000 audit: CWD cwd="/" Oct 29 01:22:47.477000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:47.477000 audit: PATH item=1 name=(null) inode=34085 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:47.477000 audit: PATH item=2 name=(null) inode=34085 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:47.477000 audit: PATH item=3 name=(null) inode=34086 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:47.477000 audit: PATH item=4 name=(null) inode=34085 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:47.477000 audit: PATH item=5 name=(null) inode=34087 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 01:22:47.477000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.615188 kernel: Failed to create system directory nfs Oct 29 01:22:47.615918 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.616580 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.617258 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.618529 kernel: Failed to create system directory nfs Oct 29 01:22:47.618556 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.619202 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.620468 kernel: Failed to create system directory nfs Oct 29 01:22:47.620494 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.621132 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.622396 kernel: Failed to create system directory nfs Oct 29 01:22:47.622420 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.623091 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.624329 kernel: Failed to create system directory nfs Oct 29 01:22:47.624354 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.625618 kernel: Failed to create system directory nfs Oct 29 01:22:47.625644 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.626282 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.627573 kernel: Failed to create system directory nfs Oct 29 01:22:47.627600 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.628239 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.629499 kernel: Failed to create system directory nfs Oct 29 01:22:47.629529 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.630171 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.631435 kernel: Failed to create system directory nfs Oct 29 01:22:47.631456 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.632100 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.633363 kernel: Failed to create system directory nfs Oct 29 01:22:47.633390 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.634645 kernel: Failed to create system directory nfs Oct 29 01:22:47.634672 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.635302 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.636560 kernel: Failed to create system directory nfs Oct 29 01:22:47.636587 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.637250 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.638514 kernel: Failed to create system directory nfs Oct 29 01:22:47.638540 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.639172 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.640445 kernel: Failed to create system directory nfs Oct 29 01:22:47.640469 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.641122 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.642397 kernel: Failed to create system directory nfs Oct 29 01:22:47.642423 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.643092 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.644330 kernel: Failed to create system directory nfs Oct 29 01:22:47.644354 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.645609 kernel: Failed to create system directory nfs Oct 29 01:22:47.645634 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.646265 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.647533 kernel: Failed to create system directory nfs Oct 29 01:22:47.647558 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.648204 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.649468 kernel: Failed to create system directory nfs Oct 29 01:22:47.649494 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.650136 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.651430 kernel: Failed to create system directory nfs Oct 29 01:22:47.651460 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.652147 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.653431 kernel: Failed to create system directory nfs Oct 29 01:22:47.653461 kernel: Failed to create system directory nfs Oct 29 01:22:47.605000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.605000 audit[2917]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561e5de94c10 a1=16eb2c a2=561e4470f2b0 a3=5 items=0 ppid=492 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:47.605000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 01:22:47.670086 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.709614 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.709647 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.709662 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.710373 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.711079 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.712353 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.712379 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.713073 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.714340 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.714366 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.715657 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.715683 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.716334 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.717632 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.717654 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.718333 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.719074 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.720378 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.720405 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.721077 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.722411 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.722438 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.723108 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.724418 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.724445 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.725112 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.726429 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.726455 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.727133 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.728451 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.728477 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.729136 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.730507 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.730533 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.731199 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.732601 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.732622 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.733288 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.734656 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.734699 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.734716 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.736481 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.736510 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.736525 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.738532 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.738561 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.738576 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.740432 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.740460 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.740473 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.741104 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.742282 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.742309 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.743542 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.743570 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.745357 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.745385 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.745400 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.746744 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.746776 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.748188 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.748212 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.749482 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.749510 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.751382 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.751406 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.751418 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.752626 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.752650 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.754457 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.754486 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.754501 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.755112 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.756302 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.756342 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.757595 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.758568 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.758592 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.759630 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.759720 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.761589 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.761628 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.761643 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.763562 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.763597 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.763612 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.765550 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.765585 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.765601 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.767574 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.767612 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.767629 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.695000 audit[2922]: AVC avc: denied { confidentiality } for pid=2922 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.769671 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.769752 kernel: Failed to create system directory nfs4 Oct 29 01:22:47.871185 kernel: NFS: Registering the id_resolver key type Oct 29 01:22:47.871272 kernel: Key type id_resolver registered Oct 29 01:22:47.871288 kernel: Key type id_legacy registered Oct 29 01:22:47.695000 audit[2922]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4560759010 a1=2095c4 a2=56027196f2b0 a3=5 items=0 ppid=492 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:47.695000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.906552 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.906622 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.906639 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.908492 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.908514 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.908532 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.909100 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.910319 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.910344 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.911545 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.911570 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.913373 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.913395 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.913407 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.914606 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.914637 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.916430 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.916456 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.917624 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.917651 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.918233 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.919449 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.919477 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.920652 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.920680 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.923040 kernel: Failed to create system directory rpcgss Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: AVC avc: denied { confidentiality } for pid=2924 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 01:22:47.902000 audit[2924]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f6370336010 a1=70bf4 a2=557665a9f2b0 a3=5 items=0 ppid=492 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:47.902000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 29 01:22:48.031929 nfsidmap[2931]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 29 01:22:48.048435 nfsidmap[2932]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 29 01:22:48.058000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 01:22:48.058000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 01:22:48.058000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 01:22:48.058000 audit[1377]: AVC avc: denied { watch_reads } for pid=1377 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 01:22:48.058000 audit[1377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f9cf799f50 a2=10 a3=31db09945645fcde items=0 ppid=1 pid=1377 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.058000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 01:22:48.058000 audit[1377]: AVC avc: denied { watch_reads } for pid=1377 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 01:22:48.058000 audit[1377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f9cf799f50 a2=10 a3=31db09945645fcde items=0 ppid=1 pid=1377 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.058000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 01:22:48.058000 audit[1377]: AVC avc: denied { watch_reads } for pid=1377 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 01:22:48.058000 audit[1377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f9cf799f50 a2=10 a3=31db09945645fcde items=0 ppid=1 pid=1377 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.058000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 01:22:48.086621 env[1271]: time="2025-10-29T01:22:48.086591107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea,Namespace:default,Attempt:0,}" Oct 29 01:22:48.237905 kubelet[1614]: E1029 01:22:48.237822 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:48.294138 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 01:22:48.294222 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 29 01:22:48.291400 systemd-networkd[1079]: cali5ec59c6bf6e: Link UP Oct 29 01:22:48.291568 systemd-networkd[1079]: cali5ec59c6bf6e: Gained carrier Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.243 [INFO][2933] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.134-k8s-test--pod--1-eth0 default fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea 1605 0 2025-10-29 01:22:38 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.134 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.243 [INFO][2933] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-eth0" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.257 [INFO][2945] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" HandleID="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Workload="10.67.124.134-k8s-test--pod--1-eth0" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.257 [INFO][2945] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" HandleID="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Workload="10.67.124.134-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.134", "pod":"test-pod-1", "timestamp":"2025-10-29 01:22:48.257362114 +0000 UTC"}, Hostname:"10.67.124.134", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.257 [INFO][2945] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.257 [INFO][2945] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.257 [INFO][2945] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.134' Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.261 [INFO][2945] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.263 [INFO][2945] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.265 [INFO][2945] ipam/ipam.go 511: Trying affinity for 192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.266 [INFO][2945] ipam/ipam.go 158: Attempting to load block cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.268 [INFO][2945] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.116.128/26 host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.268 [INFO][2945] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.116.128/26 handle="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.270 [INFO][2945] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.272 [INFO][2945] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.116.128/26 handle="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.276 [INFO][2945] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.116.132/26] block=192.168.116.128/26 handle="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.276 [INFO][2945] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.116.132/26] handle="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" host="10.67.124.134" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.276 [INFO][2945] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.276 [INFO][2945] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.116.132/26] IPv6=[] ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" HandleID="k8s-pod-network.4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Workload="10.67.124.134-k8s-test--pod--1-eth0" Oct 29 01:22:48.304079 env[1271]: 2025-10-29 01:22:48.278 [INFO][2933] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea", ResourceVersion:"1605", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:48.304649 env[1271]: 2025-10-29 01:22:48.278 [INFO][2933] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.116.132/32] ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-eth0" Oct 29 01:22:48.304649 env[1271]: 2025-10-29 01:22:48.278 [INFO][2933] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-eth0" Oct 29 01:22:48.304649 env[1271]: 2025-10-29 01:22:48.294 [INFO][2933] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-eth0" Oct 29 01:22:48.304649 env[1271]: 2025-10-29 01:22:48.297 [INFO][2933] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.134-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea", ResourceVersion:"1605", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 1, 22, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.134", ContainerID:"4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.116.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f6:7c:2d:2b:31:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 01:22:48.304649 env[1271]: 2025-10-29 01:22:48.301 [INFO][2933] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.134-k8s-test--pod--1-eth0" Oct 29 01:22:48.312383 env[1271]: time="2025-10-29T01:22:48.312314811Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 01:22:48.312383 env[1271]: time="2025-10-29T01:22:48.312350727Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 01:22:48.312383 env[1271]: time="2025-10-29T01:22:48.312358313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 01:22:48.312931 env[1271]: time="2025-10-29T01:22:48.312810272Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a pid=2969 runtime=io.containerd.runc.v2 Oct 29 01:22:48.316000 audit[2970]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 01:22:48.316000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffca5bf4f70 a2=0 a3=7ffca5bf4f5c items=0 ppid=2269 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.316000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 01:22:48.325442 systemd[1]: Started cri-containerd-4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a.scope. Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.335000 audit: BPF prog-id=120 op=LOAD Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2969 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303834303534343064343739646335623762616636306465636636 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2969 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303834303534343064343739646335623762616636306465636636 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.336000 audit: BPF prog-id=121 op=LOAD Oct 29 01:22:48.336000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000219bd0 items=0 ppid=2969 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303834303534343064343739646335623762616636306465636636 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.337000 audit: BPF prog-id=122 op=LOAD Oct 29 01:22:48.337000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000219c18 items=0 ppid=2969 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303834303534343064343739646335623762616636306465636636 Oct 29 01:22:48.337000 audit: BPF prog-id=122 op=UNLOAD Oct 29 01:22:48.337000 audit: BPF prog-id=121 op=UNLOAD Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { perfmon } for pid=2980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit[2980]: AVC avc: denied { bpf } for pid=2980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.338000 audit: BPF prog-id=123 op=LOAD Oct 29 01:22:48.338000 audit[2980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00040e028 items=0 ppid=2969 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303834303534343064343739646335623762616636306465636636 Oct 29 01:22:48.339996 systemd-resolved[1220]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 01:22:48.361336 env[1271]: time="2025-10-29T01:22:48.361309510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fd5f20f3-3f5d-4e74-ba33-dccf547fd2ea,Namespace:default,Attempt:0,} returns sandbox id \"4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a\"" Oct 29 01:22:48.362357 env[1271]: time="2025-10-29T01:22:48.362341737Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 29 01:22:48.781383 env[1271]: time="2025-10-29T01:22:48.781348006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:48.786019 env[1271]: time="2025-10-29T01:22:48.785985806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:48.788086 env[1271]: time="2025-10-29T01:22:48.788055047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:48.790352 env[1271]: time="2025-10-29T01:22:48.790330620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 01:22:48.791765 env[1271]: time="2025-10-29T01:22:48.791123658Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 29 01:22:48.798213 env[1271]: time="2025-10-29T01:22:48.798184523Z" level=info msg="CreateContainer within sandbox \"4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 29 01:22:48.805642 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4026593958.mount: Deactivated successfully. Oct 29 01:22:48.810462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount282862274.mount: Deactivated successfully. Oct 29 01:22:48.812281 env[1271]: time="2025-10-29T01:22:48.811340180Z" level=info msg="CreateContainer within sandbox \"4a08405440d479dc5b7baf60decf6abfd8ea222090d99531f0fd552c35dd723a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0443bcfc391117d247fbef20ee96c92adfd350c6a5e3f02c2635e040d5c35c56\"" Oct 29 01:22:48.812563 env[1271]: time="2025-10-29T01:22:48.812539148Z" level=info msg="StartContainer for \"0443bcfc391117d247fbef20ee96c92adfd350c6a5e3f02c2635e040d5c35c56\"" Oct 29 01:22:48.823929 systemd[1]: Started cri-containerd-0443bcfc391117d247fbef20ee96c92adfd350c6a5e3f02c2635e040d5c35c56.scope. Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit: BPF prog-id=124 op=LOAD Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2969 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034343362636663333931313137643234376662656632306565393663 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2969 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034343362636663333931313137643234376662656632306565393663 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.834000 audit: BPF prog-id=125 op=LOAD Oct 29 01:22:48.834000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001e4cc0 items=0 ppid=2969 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034343362636663333931313137643234376662656632306565393663 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit: BPF prog-id=126 op=LOAD Oct 29 01:22:48.835000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001e4d08 items=0 ppid=2969 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034343362636663333931313137643234376662656632306565393663 Oct 29 01:22:48.835000 audit: BPF prog-id=126 op=UNLOAD Oct 29 01:22:48.835000 audit: BPF prog-id=125 op=UNLOAD Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 01:22:48.835000 audit: BPF prog-id=127 op=LOAD Oct 29 01:22:48.835000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001e5118 items=0 ppid=2969 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 01:22:48.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034343362636663333931313137643234376662656632306565393663 Oct 29 01:22:48.849484 env[1271]: time="2025-10-29T01:22:48.849456095Z" level=info msg="StartContainer for \"0443bcfc391117d247fbef20ee96c92adfd350c6a5e3f02c2635e040d5c35c56\" returns successfully" Oct 29 01:22:49.238813 kubelet[1614]: E1029 01:22:49.238679 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:49.493970 kubelet[1614]: I1029 01:22:49.493934 1614 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=11.063474004 podStartE2EDuration="11.493923284s" podCreationTimestamp="2025-10-29 01:22:38 +0000 UTC" firstStartedPulling="2025-10-29 01:22:48.361894402 +0000 UTC m=+48.714188161" lastFinishedPulling="2025-10-29 01:22:48.792343683 +0000 UTC m=+49.144637441" observedRunningTime="2025-10-29 01:22:49.493658209 +0000 UTC m=+49.845951979" watchObservedRunningTime="2025-10-29 01:22:49.493923284 +0000 UTC m=+49.846217049" Oct 29 01:22:49.644494 systemd-networkd[1079]: cali5ec59c6bf6e: Gained IPv6LL Oct 29 01:22:50.239688 kubelet[1614]: E1029 01:22:50.239658 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:51.240108 kubelet[1614]: E1029 01:22:51.240060 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:52.240644 kubelet[1614]: E1029 01:22:52.240618 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:53.241278 kubelet[1614]: E1029 01:22:53.241216 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:54.241902 kubelet[1614]: E1029 01:22:54.241874 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:54.661915 systemd[1]: run-containerd-runc-k8s.io-667aa27409239fa0d11881e64f131911f66664a618384a08cab699cd56d069af-runc.r9Gedt.mount: Deactivated successfully. Oct 29 01:22:55.242702 kubelet[1614]: E1029 01:22:55.242664 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:56.243134 kubelet[1614]: E1029 01:22:56.243093 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:57.243966 kubelet[1614]: E1029 01:22:57.243927 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:58.244074 kubelet[1614]: E1029 01:22:58.244023 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:59.244529 kubelet[1614]: E1029 01:22:59.244493 1614 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 01:22:59.390731 kubelet[1614]: E1029 01:22:59.390694 1614 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-prhdl" podUID="5211ee36-d1d8-4e33-9939-d7954fab6be6"