Oct 29 00:35:27.719366 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 29 00:35:27.719387 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Tue Oct 28 23:18:12 -00 2025 Oct 29 00:35:27.719395 kernel: efi: EFI v2.70 by EDK II Oct 29 00:35:27.719401 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Oct 29 00:35:27.719406 kernel: random: crng init done Oct 29 00:35:27.719412 kernel: ACPI: Early table checksum verification disabled Oct 29 00:35:27.719418 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Oct 29 00:35:27.719425 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Oct 29 00:35:27.719431 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719437 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719443 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719448 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719454 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719460 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719467 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719474 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719480 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 00:35:27.719485 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Oct 29 00:35:27.719491 kernel: NUMA: Failed to initialise from firmware Oct 29 00:35:27.719497 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Oct 29 00:35:27.719503 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Oct 29 00:35:27.719509 kernel: Zone ranges: Oct 29 00:35:27.719530 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Oct 29 00:35:27.719537 kernel: DMA32 empty Oct 29 00:35:27.719543 kernel: Normal empty Oct 29 00:35:27.719549 kernel: Movable zone start for each node Oct 29 00:35:27.719555 kernel: Early memory node ranges Oct 29 00:35:27.719561 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Oct 29 00:35:27.719567 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Oct 29 00:35:27.719573 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Oct 29 00:35:27.719579 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Oct 29 00:35:27.719585 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Oct 29 00:35:27.719591 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Oct 29 00:35:27.719597 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Oct 29 00:35:27.719603 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Oct 29 00:35:27.719609 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Oct 29 00:35:27.719615 kernel: psci: probing for conduit method from ACPI. Oct 29 00:35:27.719621 kernel: psci: PSCIv1.1 detected in firmware. Oct 29 00:35:27.719627 kernel: psci: Using standard PSCI v0.2 function IDs Oct 29 00:35:27.719633 kernel: psci: Trusted OS migration not required Oct 29 00:35:27.719641 kernel: psci: SMC Calling Convention v1.1 Oct 29 00:35:27.719648 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Oct 29 00:35:27.719655 kernel: ACPI: SRAT not present Oct 29 00:35:27.719662 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Oct 29 00:35:27.719668 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Oct 29 00:35:27.719675 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Oct 29 00:35:27.719681 kernel: Detected PIPT I-cache on CPU0 Oct 29 00:35:27.719687 kernel: CPU features: detected: GIC system register CPU interface Oct 29 00:35:27.719694 kernel: CPU features: detected: Hardware dirty bit management Oct 29 00:35:27.719700 kernel: CPU features: detected: Spectre-v4 Oct 29 00:35:27.719707 kernel: CPU features: detected: Spectre-BHB Oct 29 00:35:27.719715 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 29 00:35:27.719722 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 29 00:35:27.719728 kernel: CPU features: detected: ARM erratum 1418040 Oct 29 00:35:27.719735 kernel: CPU features: detected: SSBS not fully self-synchronizing Oct 29 00:35:27.719742 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Oct 29 00:35:27.719748 kernel: Policy zone: DMA Oct 29 00:35:27.719756 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ddcdcc5923a51dfb24bee27c235aa754769d72fd417f60397f96d58c38c7a3e3 Oct 29 00:35:27.719763 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 29 00:35:27.719769 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 29 00:35:27.719776 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 29 00:35:27.719782 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 29 00:35:27.719790 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 114948K reserved, 0K cma-reserved) Oct 29 00:35:27.719797 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 29 00:35:27.719803 kernel: trace event string verifier disabled Oct 29 00:35:27.719810 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 29 00:35:27.719817 kernel: rcu: RCU event tracing is enabled. Oct 29 00:35:27.719823 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 29 00:35:27.719830 kernel: Trampoline variant of Tasks RCU enabled. Oct 29 00:35:27.719837 kernel: Tracing variant of Tasks RCU enabled. Oct 29 00:35:27.719843 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 29 00:35:27.719850 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 29 00:35:27.719856 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 29 00:35:27.719864 kernel: GICv3: 256 SPIs implemented Oct 29 00:35:27.719871 kernel: GICv3: 0 Extended SPIs implemented Oct 29 00:35:27.719877 kernel: GICv3: Distributor has no Range Selector support Oct 29 00:35:27.719883 kernel: Root IRQ handler: gic_handle_irq Oct 29 00:35:27.719890 kernel: GICv3: 16 PPIs implemented Oct 29 00:35:27.719896 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Oct 29 00:35:27.719903 kernel: ACPI: SRAT not present Oct 29 00:35:27.719909 kernel: ITS [mem 0x08080000-0x0809ffff] Oct 29 00:35:27.719915 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Oct 29 00:35:27.719922 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Oct 29 00:35:27.719929 kernel: GICv3: using LPI property table @0x00000000400d0000 Oct 29 00:35:27.719935 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Oct 29 00:35:27.719943 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 29 00:35:27.719949 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 29 00:35:27.719956 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 29 00:35:27.719963 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 29 00:35:27.719969 kernel: arm-pv: using stolen time PV Oct 29 00:35:27.719975 kernel: Console: colour dummy device 80x25 Oct 29 00:35:27.719982 kernel: ACPI: Core revision 20210730 Oct 29 00:35:27.719989 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 29 00:35:27.719995 kernel: pid_max: default: 32768 minimum: 301 Oct 29 00:35:27.720002 kernel: LSM: Security Framework initializing Oct 29 00:35:27.720009 kernel: SELinux: Initializing. Oct 29 00:35:27.720016 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 29 00:35:27.720023 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 29 00:35:27.720029 kernel: rcu: Hierarchical SRCU implementation. Oct 29 00:35:27.720036 kernel: Platform MSI: ITS@0x8080000 domain created Oct 29 00:35:27.720042 kernel: PCI/MSI: ITS@0x8080000 domain created Oct 29 00:35:27.720049 kernel: Remapping and enabling EFI services. Oct 29 00:35:27.720056 kernel: smp: Bringing up secondary CPUs ... Oct 29 00:35:27.720062 kernel: Detected PIPT I-cache on CPU1 Oct 29 00:35:27.720070 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Oct 29 00:35:27.720077 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Oct 29 00:35:27.720084 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 29 00:35:27.720091 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 29 00:35:27.720098 kernel: Detected PIPT I-cache on CPU2 Oct 29 00:35:27.720105 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Oct 29 00:35:27.720112 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Oct 29 00:35:27.720119 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 29 00:35:27.720126 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Oct 29 00:35:27.720132 kernel: Detected PIPT I-cache on CPU3 Oct 29 00:35:27.720140 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Oct 29 00:35:27.720147 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Oct 29 00:35:27.720153 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 29 00:35:27.720160 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Oct 29 00:35:27.720171 kernel: smp: Brought up 1 node, 4 CPUs Oct 29 00:35:27.720179 kernel: SMP: Total of 4 processors activated. Oct 29 00:35:27.720186 kernel: CPU features: detected: 32-bit EL0 Support Oct 29 00:35:27.720193 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 29 00:35:27.720200 kernel: CPU features: detected: Common not Private translations Oct 29 00:35:27.720207 kernel: CPU features: detected: CRC32 instructions Oct 29 00:35:27.720214 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 29 00:35:27.720221 kernel: CPU features: detected: LSE atomic instructions Oct 29 00:35:27.720229 kernel: CPU features: detected: Privileged Access Never Oct 29 00:35:27.720237 kernel: CPU features: detected: RAS Extension Support Oct 29 00:35:27.720244 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Oct 29 00:35:27.720257 kernel: CPU: All CPU(s) started at EL1 Oct 29 00:35:27.720264 kernel: alternatives: patching kernel code Oct 29 00:35:27.720272 kernel: devtmpfs: initialized Oct 29 00:35:27.720278 kernel: KASLR enabled Oct 29 00:35:27.720286 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 29 00:35:27.720293 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 29 00:35:27.720300 kernel: pinctrl core: initialized pinctrl subsystem Oct 29 00:35:27.720307 kernel: SMBIOS 3.0.0 present. Oct 29 00:35:27.720314 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Oct 29 00:35:27.720320 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 29 00:35:27.720327 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 29 00:35:27.720335 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 29 00:35:27.720342 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 29 00:35:27.720349 kernel: audit: initializing netlink subsys (disabled) Oct 29 00:35:27.720356 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 Oct 29 00:35:27.720363 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 29 00:35:27.720370 kernel: cpuidle: using governor menu Oct 29 00:35:27.720377 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 29 00:35:27.720384 kernel: ASID allocator initialised with 32768 entries Oct 29 00:35:27.720391 kernel: ACPI: bus type PCI registered Oct 29 00:35:27.720400 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 29 00:35:27.720407 kernel: Serial: AMBA PL011 UART driver Oct 29 00:35:27.720415 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 29 00:35:27.720422 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 29 00:35:27.720429 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 29 00:35:27.720437 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 29 00:35:27.720443 kernel: cryptd: max_cpu_qlen set to 1000 Oct 29 00:35:27.720450 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 29 00:35:27.720457 kernel: ACPI: Added _OSI(Module Device) Oct 29 00:35:27.720465 kernel: ACPI: Added _OSI(Processor Device) Oct 29 00:35:27.720472 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 29 00:35:27.720479 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 29 00:35:27.720486 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 29 00:35:27.720493 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 29 00:35:27.720500 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 29 00:35:27.720507 kernel: ACPI: Interpreter enabled Oct 29 00:35:27.720518 kernel: ACPI: Using GIC for interrupt routing Oct 29 00:35:27.720525 kernel: ACPI: MCFG table detected, 1 entries Oct 29 00:35:27.720534 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Oct 29 00:35:27.720541 kernel: printk: console [ttyAMA0] enabled Oct 29 00:35:27.720548 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 29 00:35:27.720681 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 29 00:35:27.720751 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 29 00:35:27.720817 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 29 00:35:27.720882 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Oct 29 00:35:27.720949 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Oct 29 00:35:27.720958 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Oct 29 00:35:27.720965 kernel: PCI host bridge to bus 0000:00 Oct 29 00:35:27.721038 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Oct 29 00:35:27.721098 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Oct 29 00:35:27.721157 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Oct 29 00:35:27.721245 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 29 00:35:27.721425 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Oct 29 00:35:27.721526 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Oct 29 00:35:27.721600 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Oct 29 00:35:27.721668 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Oct 29 00:35:27.721734 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Oct 29 00:35:27.721805 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Oct 29 00:35:27.721871 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Oct 29 00:35:27.721941 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Oct 29 00:35:27.722004 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Oct 29 00:35:27.722063 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Oct 29 00:35:27.722122 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Oct 29 00:35:27.722131 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Oct 29 00:35:27.722139 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Oct 29 00:35:27.722146 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Oct 29 00:35:27.722154 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Oct 29 00:35:27.722161 kernel: iommu: Default domain type: Translated Oct 29 00:35:27.722168 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 29 00:35:27.722174 kernel: vgaarb: loaded Oct 29 00:35:27.722182 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 29 00:35:27.722189 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 29 00:35:27.722196 kernel: PTP clock support registered Oct 29 00:35:27.722203 kernel: Registered efivars operations Oct 29 00:35:27.722210 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 29 00:35:27.722216 kernel: VFS: Disk quotas dquot_6.6.0 Oct 29 00:35:27.722225 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 29 00:35:27.722232 kernel: pnp: PnP ACPI init Oct 29 00:35:27.722460 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Oct 29 00:35:27.722476 kernel: pnp: PnP ACPI: found 1 devices Oct 29 00:35:27.722483 kernel: NET: Registered PF_INET protocol family Oct 29 00:35:27.722490 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 29 00:35:27.722497 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 29 00:35:27.722504 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 29 00:35:27.722543 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 29 00:35:27.722552 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 29 00:35:27.722559 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 29 00:35:27.722566 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 29 00:35:27.722573 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 29 00:35:27.722580 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 29 00:35:27.722587 kernel: PCI: CLS 0 bytes, default 64 Oct 29 00:35:27.722594 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Oct 29 00:35:27.722601 kernel: kvm [1]: HYP mode not available Oct 29 00:35:27.722609 kernel: Initialise system trusted keyrings Oct 29 00:35:27.722616 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 29 00:35:27.722623 kernel: Key type asymmetric registered Oct 29 00:35:27.722630 kernel: Asymmetric key parser 'x509' registered Oct 29 00:35:27.722637 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 29 00:35:27.722643 kernel: io scheduler mq-deadline registered Oct 29 00:35:27.722650 kernel: io scheduler kyber registered Oct 29 00:35:27.722657 kernel: io scheduler bfq registered Oct 29 00:35:27.722664 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Oct 29 00:35:27.722672 kernel: ACPI: button: Power Button [PWRB] Oct 29 00:35:27.722680 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Oct 29 00:35:27.722772 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Oct 29 00:35:27.722782 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 29 00:35:27.722789 kernel: thunder_xcv, ver 1.0 Oct 29 00:35:27.722796 kernel: thunder_bgx, ver 1.0 Oct 29 00:35:27.722803 kernel: nicpf, ver 1.0 Oct 29 00:35:27.722810 kernel: nicvf, ver 1.0 Oct 29 00:35:27.722883 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 29 00:35:27.722946 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-10-29T00:35:27 UTC (1761698127) Oct 29 00:35:27.722955 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 29 00:35:27.722961 kernel: NET: Registered PF_INET6 protocol family Oct 29 00:35:27.722968 kernel: Segment Routing with IPv6 Oct 29 00:35:27.722975 kernel: In-situ OAM (IOAM) with IPv6 Oct 29 00:35:27.722981 kernel: NET: Registered PF_PACKET protocol family Oct 29 00:35:27.722988 kernel: Key type dns_resolver registered Oct 29 00:35:27.722995 kernel: registered taskstats version 1 Oct 29 00:35:27.723003 kernel: Loading compiled-in X.509 certificates Oct 29 00:35:27.723010 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 365034a3270fb89208cc05b5e556df135e9c6322' Oct 29 00:35:27.723016 kernel: Key type .fscrypt registered Oct 29 00:35:27.723024 kernel: Key type fscrypt-provisioning registered Oct 29 00:35:27.723030 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 29 00:35:27.723037 kernel: ima: Allocated hash algorithm: sha1 Oct 29 00:35:27.723044 kernel: ima: No architecture policies found Oct 29 00:35:27.723050 kernel: clk: Disabling unused clocks Oct 29 00:35:27.723057 kernel: Freeing unused kernel memory: 36416K Oct 29 00:35:27.723065 kernel: Run /init as init process Oct 29 00:35:27.723071 kernel: with arguments: Oct 29 00:35:27.723078 kernel: /init Oct 29 00:35:27.723084 kernel: with environment: Oct 29 00:35:27.723090 kernel: HOME=/ Oct 29 00:35:27.723097 kernel: TERM=linux Oct 29 00:35:27.723103 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 29 00:35:27.723112 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 00:35:27.723122 systemd[1]: Detected virtualization kvm. Oct 29 00:35:27.723130 systemd[1]: Detected architecture arm64. Oct 29 00:35:27.723137 systemd[1]: Running in initrd. Oct 29 00:35:27.723143 systemd[1]: No hostname configured, using default hostname. Oct 29 00:35:27.723150 systemd[1]: Hostname set to . Oct 29 00:35:27.723158 systemd[1]: Initializing machine ID from VM UUID. Oct 29 00:35:27.723165 systemd[1]: Queued start job for default target initrd.target. Oct 29 00:35:27.723172 systemd[1]: Started systemd-ask-password-console.path. Oct 29 00:35:27.723180 systemd[1]: Reached target cryptsetup.target. Oct 29 00:35:27.723188 systemd[1]: Reached target paths.target. Oct 29 00:35:27.723195 systemd[1]: Reached target slices.target. Oct 29 00:35:27.723201 systemd[1]: Reached target swap.target. Oct 29 00:35:27.723208 systemd[1]: Reached target timers.target. Oct 29 00:35:27.723216 systemd[1]: Listening on iscsid.socket. Oct 29 00:35:27.723223 systemd[1]: Listening on iscsiuio.socket. Oct 29 00:35:27.723231 systemd[1]: Listening on systemd-journald-audit.socket. Oct 29 00:35:27.723238 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 29 00:35:27.723245 systemd[1]: Listening on systemd-journald.socket. Oct 29 00:35:27.723262 systemd[1]: Listening on systemd-networkd.socket. Oct 29 00:35:27.723270 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 00:35:27.723277 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 00:35:27.723284 systemd[1]: Reached target sockets.target. Oct 29 00:35:27.723292 systemd[1]: Starting kmod-static-nodes.service... Oct 29 00:35:27.723299 systemd[1]: Finished network-cleanup.service. Oct 29 00:35:27.723308 systemd[1]: Starting systemd-fsck-usr.service... Oct 29 00:35:27.723315 systemd[1]: Starting systemd-journald.service... Oct 29 00:35:27.723323 systemd[1]: Starting systemd-modules-load.service... Oct 29 00:35:27.723330 systemd[1]: Starting systemd-resolved.service... Oct 29 00:35:27.723337 systemd[1]: Starting systemd-vconsole-setup.service... Oct 29 00:35:27.723344 systemd[1]: Finished kmod-static-nodes.service. Oct 29 00:35:27.723352 kernel: audit: type=1130 audit(1761698127.718:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.723359 systemd[1]: Finished systemd-fsck-usr.service. Oct 29 00:35:27.723367 kernel: audit: type=1130 audit(1761698127.722:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.723378 systemd-journald[289]: Journal started Oct 29 00:35:27.723422 systemd-journald[289]: Runtime Journal (/run/log/journal/aca467ae1a4f403283749525d81383f6) is 6.0M, max 48.7M, 42.6M free. Oct 29 00:35:27.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.727034 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 29 00:35:27.738592 systemd[1]: Started systemd-journald.service. Oct 29 00:35:27.738618 kernel: audit: type=1130 audit(1761698127.729:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.738630 kernel: audit: type=1130 audit(1761698127.733:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.729868 systemd-modules-load[290]: Inserted module 'overlay' Oct 29 00:35:27.732311 systemd[1]: Finished systemd-vconsole-setup.service. Oct 29 00:35:27.735758 systemd[1]: Starting dracut-cmdline-ask.service... Oct 29 00:35:27.744507 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 29 00:35:27.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.747967 systemd-resolved[291]: Positive Trust Anchors: Oct 29 00:35:27.747974 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 00:35:27.748000 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 00:35:27.757615 kernel: audit: type=1130 audit(1761698127.744:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.752276 systemd-resolved[291]: Defaulting to hostname 'linux'. Oct 29 00:35:27.753183 systemd[1]: Started systemd-resolved.service. Oct 29 00:35:27.764440 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 29 00:35:27.764463 kernel: audit: type=1130 audit(1761698127.760:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.761197 systemd[1]: Finished dracut-cmdline-ask.service. Oct 29 00:35:27.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.765421 systemd[1]: Reached target nss-lookup.target. Oct 29 00:35:27.770634 kernel: audit: type=1130 audit(1761698127.765:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.770655 kernel: Bridge firewalling registered Oct 29 00:35:27.770445 systemd[1]: Starting dracut-cmdline.service... Oct 29 00:35:27.770646 systemd-modules-load[290]: Inserted module 'br_netfilter' Oct 29 00:35:27.779547 dracut-cmdline[306]: dracut-dracut-053 Oct 29 00:35:27.781903 dracut-cmdline[306]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=ddcdcc5923a51dfb24bee27c235aa754769d72fd417f60397f96d58c38c7a3e3 Oct 29 00:35:27.787614 kernel: SCSI subsystem initialized Oct 29 00:35:27.790532 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 29 00:35:27.790569 kernel: device-mapper: uevent: version 1.0.3 Oct 29 00:35:27.790578 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 29 00:35:27.794083 systemd-modules-load[290]: Inserted module 'dm_multipath' Oct 29 00:35:27.794919 systemd[1]: Finished systemd-modules-load.service. Oct 29 00:35:27.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.796604 systemd[1]: Starting systemd-sysctl.service... Oct 29 00:35:27.800591 kernel: audit: type=1130 audit(1761698127.795:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.806439 systemd[1]: Finished systemd-sysctl.service. Oct 29 00:35:27.810543 kernel: audit: type=1130 audit(1761698127.806:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.854554 kernel: Loading iSCSI transport class v2.0-870. Oct 29 00:35:27.866546 kernel: iscsi: registered transport (tcp) Oct 29 00:35:27.882543 kernel: iscsi: registered transport (qla4xxx) Oct 29 00:35:27.882560 kernel: QLogic iSCSI HBA Driver Oct 29 00:35:27.916674 systemd[1]: Finished dracut-cmdline.service. Oct 29 00:35:27.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:27.918428 systemd[1]: Starting dracut-pre-udev.service... Oct 29 00:35:27.961555 kernel: raid6: neonx8 gen() 13668 MB/s Oct 29 00:35:27.978533 kernel: raid6: neonx8 xor() 10786 MB/s Oct 29 00:35:27.995533 kernel: raid6: neonx4 gen() 13498 MB/s Oct 29 00:35:28.012530 kernel: raid6: neonx4 xor() 11141 MB/s Oct 29 00:35:28.029531 kernel: raid6: neonx2 gen() 13029 MB/s Oct 29 00:35:28.046538 kernel: raid6: neonx2 xor() 10321 MB/s Oct 29 00:35:28.063533 kernel: raid6: neonx1 gen() 10530 MB/s Oct 29 00:35:28.080534 kernel: raid6: neonx1 xor() 8764 MB/s Oct 29 00:35:28.097544 kernel: raid6: int64x8 gen() 6249 MB/s Oct 29 00:35:28.114551 kernel: raid6: int64x8 xor() 3539 MB/s Oct 29 00:35:28.131538 kernel: raid6: int64x4 gen() 7221 MB/s Oct 29 00:35:28.148537 kernel: raid6: int64x4 xor() 3847 MB/s Oct 29 00:35:28.165537 kernel: raid6: int64x2 gen() 6143 MB/s Oct 29 00:35:28.182539 kernel: raid6: int64x2 xor() 3315 MB/s Oct 29 00:35:28.199536 kernel: raid6: int64x1 gen() 5039 MB/s Oct 29 00:35:28.216638 kernel: raid6: int64x1 xor() 2644 MB/s Oct 29 00:35:28.216661 kernel: raid6: using algorithm neonx8 gen() 13668 MB/s Oct 29 00:35:28.216669 kernel: raid6: .... xor() 10786 MB/s, rmw enabled Oct 29 00:35:28.217747 kernel: raid6: using neon recovery algorithm Oct 29 00:35:28.228599 kernel: xor: measuring software checksum speed Oct 29 00:35:28.228620 kernel: 8regs : 17242 MB/sec Oct 29 00:35:28.229871 kernel: 32regs : 20686 MB/sec Oct 29 00:35:28.229885 kernel: arm64_neon : 26570 MB/sec Oct 29 00:35:28.229895 kernel: xor: using function: arm64_neon (26570 MB/sec) Oct 29 00:35:28.285572 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 29 00:35:28.296618 systemd[1]: Finished dracut-pre-udev.service. Oct 29 00:35:28.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:28.297000 audit: BPF prog-id=7 op=LOAD Oct 29 00:35:28.297000 audit: BPF prog-id=8 op=LOAD Oct 29 00:35:28.298645 systemd[1]: Starting systemd-udevd.service... Oct 29 00:35:28.311184 systemd-udevd[491]: Using default interface naming scheme 'v252'. Oct 29 00:35:28.314664 systemd[1]: Started systemd-udevd.service. Oct 29 00:35:28.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:28.316750 systemd[1]: Starting dracut-pre-trigger.service... Oct 29 00:35:28.328987 dracut-pre-trigger[499]: rd.md=0: removing MD RAID activation Oct 29 00:35:28.361423 systemd[1]: Finished dracut-pre-trigger.service. Oct 29 00:35:28.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:28.363202 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 00:35:28.397165 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 00:35:28.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:28.435346 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Oct 29 00:35:28.440640 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 29 00:35:28.440656 kernel: GPT:9289727 != 19775487 Oct 29 00:35:28.440671 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 29 00:35:28.440680 kernel: GPT:9289727 != 19775487 Oct 29 00:35:28.440688 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 29 00:35:28.440696 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 00:35:28.465110 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 29 00:35:28.467131 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (550) Oct 29 00:35:28.466162 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 29 00:35:28.470630 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 29 00:35:28.475954 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 29 00:35:28.481309 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 00:35:28.485048 systemd[1]: Starting disk-uuid.service... Oct 29 00:35:28.491249 disk-uuid[564]: Primary Header is updated. Oct 29 00:35:28.491249 disk-uuid[564]: Secondary Entries is updated. Oct 29 00:35:28.491249 disk-uuid[564]: Secondary Header is updated. Oct 29 00:35:28.495537 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 00:35:28.498537 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 00:35:28.501538 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 00:35:29.501553 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 00:35:29.502582 disk-uuid[565]: The operation has completed successfully. Oct 29 00:35:29.535329 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 29 00:35:29.536600 systemd[1]: Finished disk-uuid.service. Oct 29 00:35:29.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.539026 systemd[1]: Starting verity-setup.service... Oct 29 00:35:29.552543 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 29 00:35:29.577442 systemd[1]: Found device dev-mapper-usr.device. Oct 29 00:35:29.580235 systemd[1]: Mounting sysusr-usr.mount... Oct 29 00:35:29.582141 systemd[1]: Finished verity-setup.service. Oct 29 00:35:29.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.629556 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 29 00:35:29.629817 systemd[1]: Mounted sysusr-usr.mount. Oct 29 00:35:29.630625 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 29 00:35:29.631315 systemd[1]: Starting ignition-setup.service... Oct 29 00:35:29.635226 systemd[1]: Starting parse-ip-for-networkd.service... Oct 29 00:35:29.646224 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Oct 29 00:35:29.646266 kernel: BTRFS info (device vda6): using free space tree Oct 29 00:35:29.646277 kernel: BTRFS info (device vda6): has skinny extents Oct 29 00:35:29.655299 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 29 00:35:29.663091 systemd[1]: Finished ignition-setup.service. Oct 29 00:35:29.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.664736 systemd[1]: Starting ignition-fetch-offline.service... Oct 29 00:35:29.725378 systemd[1]: Finished parse-ip-for-networkd.service. Oct 29 00:35:29.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.732000 audit: BPF prog-id=9 op=LOAD Oct 29 00:35:29.733961 systemd[1]: Starting systemd-networkd.service... Oct 29 00:35:29.748753 ignition[656]: Ignition 2.14.0 Oct 29 00:35:29.748771 ignition[656]: Stage: fetch-offline Oct 29 00:35:29.748825 ignition[656]: no configs at "/usr/lib/ignition/base.d" Oct 29 00:35:29.748836 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 29 00:35:29.748986 ignition[656]: parsed url from cmdline: "" Oct 29 00:35:29.748990 ignition[656]: no config URL provided Oct 29 00:35:29.748994 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 00:35:29.753559 systemd-networkd[742]: lo: Link UP Oct 29 00:35:29.749001 ignition[656]: no config at "/usr/lib/ignition/user.ign" Oct 29 00:35:29.753562 systemd-networkd[742]: lo: Gained carrier Oct 29 00:35:29.749035 ignition[656]: op(1): [started] loading QEMU firmware config module Oct 29 00:35:29.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.753940 systemd-networkd[742]: Enumeration completed Oct 29 00:35:29.749040 ignition[656]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 29 00:35:29.754134 systemd-networkd[742]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 00:35:29.759574 ignition[656]: op(1): [finished] loading QEMU firmware config module Oct 29 00:35:29.754562 systemd[1]: Started systemd-networkd.service. Oct 29 00:35:29.755548 systemd-networkd[742]: eth0: Link UP Oct 29 00:35:29.755551 systemd-networkd[742]: eth0: Gained carrier Oct 29 00:35:29.757869 systemd[1]: Reached target network.target. Oct 29 00:35:29.759920 systemd[1]: Starting iscsiuio.service... Oct 29 00:35:29.771318 systemd[1]: Started iscsiuio.service. Oct 29 00:35:29.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.773098 systemd[1]: Starting iscsid.service... Oct 29 00:35:29.773161 ignition[656]: parsing config with SHA512: ffbe724d2f6beb91b5114ce918aa2167d8d2adbd921d8b92ea210e7b18a5808f92bd54ab68fa81a0a51b51b122efa24c89eed9309c0ae92d8d8ae58ca9cf81ae Oct 29 00:35:29.776922 iscsid[748]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 29 00:35:29.776922 iscsid[748]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 29 00:35:29.776922 iscsid[748]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 29 00:35:29.776922 iscsid[748]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 29 00:35:29.776922 iscsid[748]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 29 00:35:29.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.790136 iscsid[748]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 29 00:35:29.784417 systemd[1]: Started iscsid.service. Oct 29 00:35:29.784545 systemd-networkd[742]: eth0: DHCPv4 address 10.0.0.84/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 29 00:35:29.786818 systemd[1]: Starting dracut-initqueue.service... Oct 29 00:35:29.795106 unknown[656]: fetched base config from "system" Oct 29 00:35:29.795121 unknown[656]: fetched user config from "qemu" Oct 29 00:35:29.795675 ignition[656]: fetch-offline: fetch-offline passed Oct 29 00:35:29.795758 ignition[656]: Ignition finished successfully Oct 29 00:35:29.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.799004 systemd[1]: Finished ignition-fetch-offline.service. Oct 29 00:35:29.800031 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 29 00:35:29.800876 systemd[1]: Starting ignition-kargs.service... Oct 29 00:35:29.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.802589 systemd[1]: Finished dracut-initqueue.service. Oct 29 00:35:29.803865 systemd[1]: Reached target remote-fs-pre.target. Oct 29 00:35:29.805209 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 00:35:29.806722 systemd[1]: Reached target remote-fs.target. Oct 29 00:35:29.808994 systemd[1]: Starting dracut-pre-mount.service... Oct 29 00:35:29.811760 ignition[756]: Ignition 2.14.0 Oct 29 00:35:29.811767 ignition[756]: Stage: kargs Oct 29 00:35:29.811867 ignition[756]: no configs at "/usr/lib/ignition/base.d" Oct 29 00:35:29.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.813857 systemd[1]: Finished ignition-kargs.service. Oct 29 00:35:29.811876 ignition[756]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 29 00:35:29.816105 systemd[1]: Starting ignition-disks.service... Oct 29 00:35:29.812669 ignition[756]: kargs: kargs passed Oct 29 00:35:29.812717 ignition[756]: Ignition finished successfully Oct 29 00:35:29.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.819457 systemd[1]: Finished dracut-pre-mount.service. Oct 29 00:35:29.825149 ignition[769]: Ignition 2.14.0 Oct 29 00:35:29.825161 ignition[769]: Stage: disks Oct 29 00:35:29.825276 ignition[769]: no configs at "/usr/lib/ignition/base.d" Oct 29 00:35:29.827307 systemd[1]: Finished ignition-disks.service. Oct 29 00:35:29.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.825286 ignition[769]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 29 00:35:29.828868 systemd[1]: Reached target initrd-root-device.target. Oct 29 00:35:29.826035 ignition[769]: disks: disks passed Oct 29 00:35:29.830213 systemd[1]: Reached target local-fs-pre.target. Oct 29 00:35:29.826077 ignition[769]: Ignition finished successfully Oct 29 00:35:29.831865 systemd[1]: Reached target local-fs.target. Oct 29 00:35:29.833435 systemd[1]: Reached target sysinit.target. Oct 29 00:35:29.834599 systemd[1]: Reached target basic.target. Oct 29 00:35:29.836933 systemd[1]: Starting systemd-fsck-root.service... Oct 29 00:35:29.850106 systemd-fsck[777]: ROOT: clean, 637/553520 files, 56031/553472 blocks Oct 29 00:35:29.854281 systemd[1]: Finished systemd-fsck-root.service. Oct 29 00:35:29.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.856043 systemd[1]: Mounting sysroot.mount... Oct 29 00:35:29.866543 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 29 00:35:29.867051 systemd[1]: Mounted sysroot.mount. Oct 29 00:35:29.867911 systemd[1]: Reached target initrd-root-fs.target. Oct 29 00:35:29.870323 systemd[1]: Mounting sysroot-usr.mount... Oct 29 00:35:29.871341 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 29 00:35:29.871388 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 29 00:35:29.871414 systemd[1]: Reached target ignition-diskful.target. Oct 29 00:35:29.873538 systemd[1]: Mounted sysroot-usr.mount. Oct 29 00:35:29.875452 systemd[1]: Starting initrd-setup-root.service... Oct 29 00:35:29.880547 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory Oct 29 00:35:29.885901 initrd-setup-root[795]: cut: /sysroot/etc/group: No such file or directory Oct 29 00:35:29.890955 initrd-setup-root[803]: cut: /sysroot/etc/shadow: No such file or directory Oct 29 00:35:29.895900 initrd-setup-root[811]: cut: /sysroot/etc/gshadow: No such file or directory Oct 29 00:35:29.940074 systemd[1]: Finished initrd-setup-root.service. Oct 29 00:35:29.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.941834 systemd[1]: Starting ignition-mount.service... Oct 29 00:35:29.943217 systemd[1]: Starting sysroot-boot.service... Oct 29 00:35:29.947833 bash[828]: umount: /sysroot/usr/share/oem: not mounted. Oct 29 00:35:29.958559 ignition[829]: INFO : Ignition 2.14.0 Oct 29 00:35:29.959668 ignition[829]: INFO : Stage: mount Oct 29 00:35:29.960408 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 29 00:35:29.960408 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 29 00:35:29.962797 ignition[829]: INFO : mount: mount passed Oct 29 00:35:29.962797 ignition[829]: INFO : Ignition finished successfully Oct 29 00:35:29.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:29.961661 systemd[1]: Finished ignition-mount.service. Oct 29 00:35:29.969146 systemd[1]: Finished sysroot-boot.service. Oct 29 00:35:29.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:30.593919 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 29 00:35:30.602549 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (838) Oct 29 00:35:30.604644 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Oct 29 00:35:30.604696 kernel: BTRFS info (device vda6): using free space tree Oct 29 00:35:30.604706 kernel: BTRFS info (device vda6): has skinny extents Oct 29 00:35:30.609091 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 29 00:35:30.615103 systemd[1]: Starting ignition-files.service... Oct 29 00:35:30.629895 ignition[858]: INFO : Ignition 2.14.0 Oct 29 00:35:30.629895 ignition[858]: INFO : Stage: files Oct 29 00:35:30.629895 ignition[858]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 29 00:35:30.629895 ignition[858]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 29 00:35:30.637776 ignition[858]: DEBUG : files: compiled without relabeling support, skipping Oct 29 00:35:30.637776 ignition[858]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 29 00:35:30.637776 ignition[858]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 29 00:35:30.637776 ignition[858]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 29 00:35:30.637776 ignition[858]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 29 00:35:30.637776 ignition[858]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Oct 29 00:35:30.637776 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 Oct 29 00:35:30.636113 unknown[858]: wrote ssh authorized keys file for user: core Oct 29 00:35:30.950812 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 29 00:35:31.415268 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Oct 29 00:35:31.415268 ignition[858]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Oct 29 00:35:31.419867 ignition[858]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 29 00:35:31.419867 ignition[858]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 29 00:35:31.419867 ignition[858]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Oct 29 00:35:31.419867 ignition[858]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Oct 29 00:35:31.419867 ignition[858]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 29 00:35:31.451195 ignition[858]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 29 00:35:31.453772 ignition[858]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Oct 29 00:35:31.453772 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 29 00:35:31.453772 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 29 00:35:31.453772 ignition[858]: INFO : files: files passed Oct 29 00:35:31.453772 ignition[858]: INFO : Ignition finished successfully Oct 29 00:35:31.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.453814 systemd[1]: Finished ignition-files.service. Oct 29 00:35:31.457316 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 29 00:35:31.459041 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 29 00:35:31.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.468016 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 29 00:35:31.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.459757 systemd[1]: Starting ignition-quench.service... Oct 29 00:35:31.471442 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 29 00:35:31.464554 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 29 00:35:31.464641 systemd[1]: Finished ignition-quench.service. Oct 29 00:35:31.466164 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 29 00:35:31.468818 systemd[1]: Reached target ignition-complete.target. Oct 29 00:35:31.471495 systemd[1]: Starting initrd-parse-etc.service... Oct 29 00:35:31.486285 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 29 00:35:31.486388 systemd[1]: Finished initrd-parse-etc.service. Oct 29 00:35:31.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.488777 systemd[1]: Reached target initrd-fs.target. Oct 29 00:35:31.490075 systemd[1]: Reached target initrd.target. Oct 29 00:35:31.491674 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 29 00:35:31.492493 systemd[1]: Starting dracut-pre-pivot.service... Oct 29 00:35:31.503324 systemd[1]: Finished dracut-pre-pivot.service. Oct 29 00:35:31.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.505057 systemd[1]: Starting initrd-cleanup.service... Oct 29 00:35:31.513742 systemd[1]: Stopped target nss-lookup.target. Oct 29 00:35:31.514699 systemd[1]: Stopped target remote-cryptsetup.target. Oct 29 00:35:31.516342 systemd[1]: Stopped target timers.target. Oct 29 00:35:31.517803 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 29 00:35:31.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.517924 systemd[1]: Stopped dracut-pre-pivot.service. Oct 29 00:35:31.519331 systemd[1]: Stopped target initrd.target. Oct 29 00:35:31.521048 systemd[1]: Stopped target basic.target. Oct 29 00:35:31.522299 systemd[1]: Stopped target ignition-complete.target. Oct 29 00:35:31.523735 systemd[1]: Stopped target ignition-diskful.target. Oct 29 00:35:31.525101 systemd[1]: Stopped target initrd-root-device.target. Oct 29 00:35:31.526594 systemd[1]: Stopped target remote-fs.target. Oct 29 00:35:31.528124 systemd[1]: Stopped target remote-fs-pre.target. Oct 29 00:35:31.529641 systemd[1]: Stopped target sysinit.target. Oct 29 00:35:31.530958 systemd[1]: Stopped target local-fs.target. Oct 29 00:35:31.532350 systemd[1]: Stopped target local-fs-pre.target. Oct 29 00:35:31.533740 systemd[1]: Stopped target swap.target. Oct 29 00:35:31.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.535035 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 29 00:35:31.535156 systemd[1]: Stopped dracut-pre-mount.service. Oct 29 00:35:31.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.536583 systemd[1]: Stopped target cryptsetup.target. Oct 29 00:35:31.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.537935 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 29 00:35:31.538045 systemd[1]: Stopped dracut-initqueue.service. Oct 29 00:35:31.539480 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 29 00:35:31.539588 systemd[1]: Stopped ignition-fetch-offline.service. Oct 29 00:35:31.541020 systemd[1]: Stopped target paths.target. Oct 29 00:35:31.542348 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 29 00:35:31.546554 systemd[1]: Stopped systemd-ask-password-console.path. Oct 29 00:35:31.548411 systemd[1]: Stopped target slices.target. Oct 29 00:35:31.549853 systemd[1]: Stopped target sockets.target. Oct 29 00:35:31.551252 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 29 00:35:31.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.551375 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 29 00:35:31.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.552745 systemd[1]: ignition-files.service: Deactivated successfully. Oct 29 00:35:31.552844 systemd[1]: Stopped ignition-files.service. Oct 29 00:35:31.558451 iscsid[748]: iscsid shutting down. Oct 29 00:35:31.555304 systemd[1]: Stopping ignition-mount.service... Oct 29 00:35:31.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.556989 systemd[1]: Stopping iscsid.service... Oct 29 00:35:31.558957 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 29 00:35:31.559084 systemd[1]: Stopped kmod-static-nodes.service. Oct 29 00:35:31.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.561314 systemd[1]: Stopping sysroot-boot.service... Oct 29 00:35:31.562010 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 29 00:35:31.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.562144 systemd[1]: Stopped systemd-udev-trigger.service. Oct 29 00:35:31.563695 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 29 00:35:31.576510 ignition[898]: INFO : Ignition 2.14.0 Oct 29 00:35:31.576510 ignition[898]: INFO : Stage: umount Oct 29 00:35:31.576510 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 29 00:35:31.576510 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 29 00:35:31.576510 ignition[898]: INFO : umount: umount passed Oct 29 00:35:31.576510 ignition[898]: INFO : Ignition finished successfully Oct 29 00:35:31.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.563802 systemd[1]: Stopped dracut-pre-trigger.service. Oct 29 00:35:31.566822 systemd[1]: iscsid.service: Deactivated successfully. Oct 29 00:35:31.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.566977 systemd[1]: Stopped iscsid.service. Oct 29 00:35:31.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.569503 systemd[1]: iscsid.socket: Deactivated successfully. Oct 29 00:35:31.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.569598 systemd[1]: Closed iscsid.socket. Oct 29 00:35:31.572713 systemd[1]: Stopping iscsiuio.service... Oct 29 00:35:31.576205 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 29 00:35:31.577536 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 29 00:35:31.577634 systemd[1]: Stopped iscsiuio.service. Oct 29 00:35:31.579056 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 29 00:35:31.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.579125 systemd[1]: Finished initrd-cleanup.service. Oct 29 00:35:31.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.580905 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 29 00:35:31.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.580979 systemd[1]: Stopped ignition-mount.service. Oct 29 00:35:31.583471 systemd[1]: Stopped target network.target. Oct 29 00:35:31.587440 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 29 00:35:31.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.587697 systemd[1]: Closed iscsiuio.socket. Oct 29 00:35:31.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.589950 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 29 00:35:31.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.590012 systemd[1]: Stopped ignition-disks.service. Oct 29 00:35:31.591694 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 29 00:35:31.591738 systemd[1]: Stopped ignition-kargs.service. Oct 29 00:35:31.593855 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 29 00:35:31.593908 systemd[1]: Stopped ignition-setup.service. Oct 29 00:35:31.595273 systemd[1]: Stopping systemd-networkd.service... Oct 29 00:35:31.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.598080 systemd[1]: Stopping systemd-resolved.service... Oct 29 00:35:31.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.602965 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 29 00:35:31.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.603056 systemd[1]: Stopped sysroot-boot.service. Oct 29 00:35:31.604289 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 29 00:35:31.604335 systemd[1]: Stopped initrd-setup-root.service. Oct 29 00:35:31.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.631000 audit: BPF prog-id=6 op=UNLOAD Oct 29 00:35:31.604563 systemd-networkd[742]: eth0: DHCPv6 lease lost Oct 29 00:35:31.631000 audit: BPF prog-id=9 op=UNLOAD Oct 29 00:35:31.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.605953 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 29 00:35:31.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.606043 systemd[1]: Stopped systemd-networkd.service. Oct 29 00:35:31.607211 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 29 00:35:31.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.607252 systemd[1]: Closed systemd-networkd.socket. Oct 29 00:35:31.609177 systemd[1]: Stopping network-cleanup.service... Oct 29 00:35:31.609971 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 29 00:35:31.610029 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 29 00:35:31.611436 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 29 00:35:31.611477 systemd[1]: Stopped systemd-sysctl.service. Oct 29 00:35:31.613660 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 29 00:35:31.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.613703 systemd[1]: Stopped systemd-modules-load.service. Oct 29 00:35:31.615975 systemd[1]: Stopping systemd-udevd.service... Oct 29 00:35:31.619051 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 29 00:35:31.621178 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 29 00:35:31.621299 systemd[1]: Stopped systemd-resolved.service. Oct 29 00:35:31.623294 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 29 00:35:31.623407 systemd[1]: Stopped systemd-udevd.service. Oct 29 00:35:31.624595 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 29 00:35:31.624671 systemd[1]: Stopped network-cleanup.service. Oct 29 00:35:31.625964 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 29 00:35:31.625998 systemd[1]: Closed systemd-udevd-control.socket. Oct 29 00:35:31.627317 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 29 00:35:31.627353 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 29 00:35:31.628721 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 29 00:35:31.628776 systemd[1]: Stopped dracut-pre-udev.service. Oct 29 00:35:31.630419 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 29 00:35:31.630462 systemd[1]: Stopped dracut-cmdline.service. Oct 29 00:35:31.666907 systemd-journald[289]: Received SIGTERM from PID 1 (n/a). Oct 29 00:35:31.631924 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 29 00:35:31.631967 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 29 00:35:31.634191 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 29 00:35:31.635040 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 29 00:35:31.635094 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 29 00:35:31.641904 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 29 00:35:31.641991 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 29 00:35:31.643513 systemd[1]: Reached target initrd-switch-root.target. Oct 29 00:35:31.645920 systemd[1]: Starting initrd-switch-root.service... Oct 29 00:35:31.652642 systemd[1]: Switching root. Oct 29 00:35:31.671816 systemd-journald[289]: Journal stopped Oct 29 00:35:33.776287 kernel: SELinux: Class mctp_socket not defined in policy. Oct 29 00:35:33.776342 kernel: SELinux: Class anon_inode not defined in policy. Oct 29 00:35:33.776359 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 29 00:35:33.776370 kernel: SELinux: policy capability network_peer_controls=1 Oct 29 00:35:33.776382 kernel: SELinux: policy capability open_perms=1 Oct 29 00:35:33.776395 kernel: SELinux: policy capability extended_socket_class=1 Oct 29 00:35:33.776409 kernel: SELinux: policy capability always_check_network=0 Oct 29 00:35:33.776418 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 29 00:35:33.776428 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 29 00:35:33.776437 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 29 00:35:33.776448 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 29 00:35:33.776459 systemd[1]: Successfully loaded SELinux policy in 37.548ms. Oct 29 00:35:33.776474 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.856ms. Oct 29 00:35:33.776487 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 00:35:33.776498 systemd[1]: Detected virtualization kvm. Oct 29 00:35:33.776508 systemd[1]: Detected architecture arm64. Oct 29 00:35:33.776547 systemd[1]: Detected first boot. Oct 29 00:35:33.776558 systemd[1]: Initializing machine ID from VM UUID. Oct 29 00:35:33.776569 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 29 00:35:33.776582 systemd[1]: Populated /etc with preset unit settings. Oct 29 00:35:33.776592 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 00:35:33.776605 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 00:35:33.776617 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 00:35:33.776628 kernel: kauditd_printk_skb: 82 callbacks suppressed Oct 29 00:35:33.776638 kernel: audit: type=1334 audit(1761698133.644:86): prog-id=12 op=LOAD Oct 29 00:35:33.776648 kernel: audit: type=1334 audit(1761698133.644:87): prog-id=3 op=UNLOAD Oct 29 00:35:33.776658 kernel: audit: type=1334 audit(1761698133.646:88): prog-id=13 op=LOAD Oct 29 00:35:33.776667 kernel: audit: type=1334 audit(1761698133.646:89): prog-id=14 op=LOAD Oct 29 00:35:33.776677 kernel: audit: type=1334 audit(1761698133.646:90): prog-id=4 op=UNLOAD Oct 29 00:35:33.776687 kernel: audit: type=1334 audit(1761698133.646:91): prog-id=5 op=UNLOAD Oct 29 00:35:33.776697 kernel: audit: type=1334 audit(1761698133.648:92): prog-id=15 op=LOAD Oct 29 00:35:33.776707 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 29 00:35:33.776718 kernel: audit: type=1334 audit(1761698133.648:93): prog-id=12 op=UNLOAD Oct 29 00:35:33.776727 systemd[1]: Stopped initrd-switch-root.service. Oct 29 00:35:33.776737 kernel: audit: type=1334 audit(1761698133.649:94): prog-id=16 op=LOAD Oct 29 00:35:33.776748 kernel: audit: type=1334 audit(1761698133.650:95): prog-id=17 op=LOAD Oct 29 00:35:33.776759 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 29 00:35:33.776770 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 29 00:35:33.776781 systemd[1]: Created slice system-addon\x2drun.slice. Oct 29 00:35:33.776791 systemd[1]: Created slice system-getty.slice. Oct 29 00:35:33.776802 systemd[1]: Created slice system-modprobe.slice. Oct 29 00:35:33.776812 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 29 00:35:33.776822 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 29 00:35:33.776832 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 29 00:35:33.776843 systemd[1]: Created slice user.slice. Oct 29 00:35:33.776853 systemd[1]: Started systemd-ask-password-console.path. Oct 29 00:35:33.776865 systemd[1]: Started systemd-ask-password-wall.path. Oct 29 00:35:33.776875 systemd[1]: Set up automount boot.automount. Oct 29 00:35:33.776885 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 29 00:35:33.776895 systemd[1]: Stopped target initrd-switch-root.target. Oct 29 00:35:33.776905 systemd[1]: Stopped target initrd-fs.target. Oct 29 00:35:33.776916 systemd[1]: Stopped target initrd-root-fs.target. Oct 29 00:35:33.776928 systemd[1]: Reached target integritysetup.target. Oct 29 00:35:33.776938 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 00:35:33.776949 systemd[1]: Reached target remote-fs.target. Oct 29 00:35:33.776959 systemd[1]: Reached target slices.target. Oct 29 00:35:33.776969 systemd[1]: Reached target swap.target. Oct 29 00:35:33.776979 systemd[1]: Reached target torcx.target. Oct 29 00:35:33.776989 systemd[1]: Reached target veritysetup.target. Oct 29 00:35:33.776999 systemd[1]: Listening on systemd-coredump.socket. Oct 29 00:35:33.777010 systemd[1]: Listening on systemd-initctl.socket. Oct 29 00:35:33.777021 systemd[1]: Listening on systemd-networkd.socket. Oct 29 00:35:33.777032 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 00:35:33.777042 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 00:35:33.777053 systemd[1]: Listening on systemd-userdbd.socket. Oct 29 00:35:33.777062 systemd[1]: Mounting dev-hugepages.mount... Oct 29 00:35:33.777073 systemd[1]: Mounting dev-mqueue.mount... Oct 29 00:35:33.777084 systemd[1]: Mounting media.mount... Oct 29 00:35:33.777094 systemd[1]: Mounting sys-kernel-debug.mount... Oct 29 00:35:33.777105 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 29 00:35:33.777116 systemd[1]: Mounting tmp.mount... Oct 29 00:35:33.777127 systemd[1]: Starting flatcar-tmpfiles.service... Oct 29 00:35:33.777138 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 00:35:33.777148 systemd[1]: Starting kmod-static-nodes.service... Oct 29 00:35:33.777159 systemd[1]: Starting modprobe@configfs.service... Oct 29 00:35:33.777295 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 00:35:33.777315 systemd[1]: Starting modprobe@drm.service... Oct 29 00:35:33.777326 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 00:35:33.777336 systemd[1]: Starting modprobe@fuse.service... Oct 29 00:35:33.777351 systemd[1]: Starting modprobe@loop.service... Oct 29 00:35:33.777362 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 29 00:35:33.777373 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 29 00:35:33.777383 systemd[1]: Stopped systemd-fsck-root.service. Oct 29 00:35:33.777393 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 29 00:35:33.777403 kernel: fuse: init (API version 7.34) Oct 29 00:35:33.777414 systemd[1]: Stopped systemd-fsck-usr.service. Oct 29 00:35:33.777424 systemd[1]: Stopped systemd-journald.service. Oct 29 00:35:33.777439 kernel: loop: module loaded Oct 29 00:35:33.777453 systemd[1]: Starting systemd-journald.service... Oct 29 00:35:33.777464 systemd[1]: Starting systemd-modules-load.service... Oct 29 00:35:33.777474 systemd[1]: Starting systemd-network-generator.service... Oct 29 00:35:33.777484 systemd[1]: Starting systemd-remount-fs.service... Oct 29 00:35:33.777495 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 00:35:33.777505 systemd[1]: verity-setup.service: Deactivated successfully. Oct 29 00:35:33.777527 systemd[1]: Stopped verity-setup.service. Oct 29 00:35:33.777538 systemd[1]: Mounted dev-hugepages.mount. Oct 29 00:35:33.777548 systemd[1]: Mounted dev-mqueue.mount. Oct 29 00:35:33.777558 systemd[1]: Mounted media.mount. Oct 29 00:35:33.777570 systemd[1]: Mounted sys-kernel-debug.mount. Oct 29 00:35:33.777583 systemd-journald[1006]: Journal started Oct 29 00:35:33.777632 systemd-journald[1006]: Runtime Journal (/run/log/journal/aca467ae1a4f403283749525d81383f6) is 6.0M, max 48.7M, 42.6M free. Oct 29 00:35:31.731000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 29 00:35:31.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 00:35:31.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 00:35:31.807000 audit: BPF prog-id=10 op=LOAD Oct 29 00:35:31.807000 audit: BPF prog-id=10 op=UNLOAD Oct 29 00:35:31.807000 audit: BPF prog-id=11 op=LOAD Oct 29 00:35:31.807000 audit: BPF prog-id=11 op=UNLOAD Oct 29 00:35:31.856000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 29 00:35:31.856000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:31.856000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 00:35:31.857000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 29 00:35:31.857000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:31.857000 audit: CWD cwd="/" Oct 29 00:35:31.857000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:31.857000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:31.857000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 00:35:33.644000 audit: BPF prog-id=12 op=LOAD Oct 29 00:35:33.644000 audit: BPF prog-id=3 op=UNLOAD Oct 29 00:35:33.646000 audit: BPF prog-id=13 op=LOAD Oct 29 00:35:33.646000 audit: BPF prog-id=14 op=LOAD Oct 29 00:35:33.646000 audit: BPF prog-id=4 op=UNLOAD Oct 29 00:35:33.646000 audit: BPF prog-id=5 op=UNLOAD Oct 29 00:35:33.648000 audit: BPF prog-id=15 op=LOAD Oct 29 00:35:33.648000 audit: BPF prog-id=12 op=UNLOAD Oct 29 00:35:33.649000 audit: BPF prog-id=16 op=LOAD Oct 29 00:35:33.650000 audit: BPF prog-id=17 op=LOAD Oct 29 00:35:33.650000 audit: BPF prog-id=13 op=UNLOAD Oct 29 00:35:33.650000 audit: BPF prog-id=14 op=UNLOAD Oct 29 00:35:33.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.665000 audit: BPF prog-id=15 op=UNLOAD Oct 29 00:35:33.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.753000 audit: BPF prog-id=18 op=LOAD Oct 29 00:35:33.753000 audit: BPF prog-id=19 op=LOAD Oct 29 00:35:33.753000 audit: BPF prog-id=20 op=LOAD Oct 29 00:35:33.753000 audit: BPF prog-id=16 op=UNLOAD Oct 29 00:35:33.753000 audit: BPF prog-id=17 op=UNLOAD Oct 29 00:35:33.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.774000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 29 00:35:33.774000 audit[1006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffecced020 a2=4000 a3=1 items=0 ppid=1 pid=1006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:33.774000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 29 00:35:33.643671 systemd[1]: Queued start job for default target multi-user.target. Oct 29 00:35:31.854390 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 00:35:33.643683 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 29 00:35:31.854786 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 00:35:33.651194 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 29 00:35:31.854926 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 00:35:31.854962 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 29 00:35:31.854973 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 29 00:35:31.855006 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 29 00:35:31.855018 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 29 00:35:31.855287 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 29 00:35:31.855329 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 00:35:31.855341 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 00:35:31.856180 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 29 00:35:33.779641 systemd[1]: Started systemd-journald.service. Oct 29 00:35:31.856218 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 29 00:35:33.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:31.856246 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 29 00:35:31.856264 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 29 00:35:31.856284 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 29 00:35:31.856296 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 29 00:35:33.355172 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 00:35:33.355436 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 00:35:33.355542 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 00:35:33.780198 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 29 00:35:33.355701 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 00:35:33.355748 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 29 00:35:33.355800 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2025-10-29T00:35:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 29 00:35:33.781208 systemd[1]: Mounted tmp.mount. Oct 29 00:35:33.782196 systemd[1]: Finished kmod-static-nodes.service. Oct 29 00:35:33.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.783754 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 29 00:35:33.783907 systemd[1]: Finished modprobe@configfs.service. Oct 29 00:35:33.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.785083 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 00:35:33.785252 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 00:35:33.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.786361 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 00:35:33.786506 systemd[1]: Finished modprobe@drm.service. Oct 29 00:35:33.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.787633 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 00:35:33.787796 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 00:35:33.789003 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 29 00:35:33.789165 systemd[1]: Finished modprobe@fuse.service. Oct 29 00:35:33.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.790188 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 00:35:33.790383 systemd[1]: Finished modprobe@loop.service. Oct 29 00:35:33.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.791762 systemd[1]: Finished systemd-modules-load.service. Oct 29 00:35:33.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.792914 systemd[1]: Finished flatcar-tmpfiles.service. Oct 29 00:35:33.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.794143 systemd[1]: Finished systemd-network-generator.service. Oct 29 00:35:33.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.795421 systemd[1]: Finished systemd-remount-fs.service. Oct 29 00:35:33.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.796804 systemd[1]: Reached target network-pre.target. Oct 29 00:35:33.799041 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 29 00:35:33.801036 systemd[1]: Mounting sys-kernel-config.mount... Oct 29 00:35:33.801816 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 29 00:35:33.804902 systemd[1]: Starting systemd-hwdb-update.service... Oct 29 00:35:33.806947 systemd[1]: Starting systemd-journal-flush.service... Oct 29 00:35:33.808051 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 00:35:33.809085 systemd[1]: Starting systemd-random-seed.service... Oct 29 00:35:33.810058 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 00:35:33.811044 systemd[1]: Starting systemd-sysctl.service... Oct 29 00:35:33.813086 systemd[1]: Starting systemd-sysusers.service... Oct 29 00:35:33.816834 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 00:35:33.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.818256 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 29 00:35:33.819381 systemd[1]: Mounted sys-kernel-config.mount. Oct 29 00:35:33.820096 systemd-journald[1006]: Time spent on flushing to /var/log/journal/aca467ae1a4f403283749525d81383f6 is 15.497ms for 983 entries. Oct 29 00:35:33.820096 systemd-journald[1006]: System Journal (/var/log/journal/aca467ae1a4f403283749525d81383f6) is 8.0M, max 195.6M, 187.6M free. Oct 29 00:35:33.849026 systemd-journald[1006]: Received client request to flush runtime journal. Oct 29 00:35:33.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.824850 systemd[1]: Starting systemd-udev-settle.service... Oct 29 00:35:33.827368 systemd[1]: Finished systemd-random-seed.service. Oct 29 00:35:33.849391 udevadm[1033]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 29 00:35:33.828743 systemd[1]: Reached target first-boot-complete.target. Oct 29 00:35:33.844734 systemd[1]: Finished systemd-sysusers.service. Oct 29 00:35:33.850004 systemd[1]: Finished systemd-journal-flush.service. Oct 29 00:35:33.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:33.851485 systemd[1]: Finished systemd-sysctl.service. Oct 29 00:35:33.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.213734 systemd[1]: Finished systemd-hwdb-update.service. Oct 29 00:35:34.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.215000 audit: BPF prog-id=21 op=LOAD Oct 29 00:35:34.216000 audit: BPF prog-id=22 op=LOAD Oct 29 00:35:34.216000 audit: BPF prog-id=7 op=UNLOAD Oct 29 00:35:34.216000 audit: BPF prog-id=8 op=UNLOAD Oct 29 00:35:34.217706 systemd[1]: Starting systemd-udevd.service... Oct 29 00:35:34.235297 systemd-udevd[1037]: Using default interface naming scheme 'v252'. Oct 29 00:35:34.254986 systemd[1]: Started systemd-udevd.service. Oct 29 00:35:34.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.258000 audit: BPF prog-id=23 op=LOAD Oct 29 00:35:34.262661 systemd[1]: Starting systemd-networkd.service... Oct 29 00:35:34.268000 audit: BPF prog-id=24 op=LOAD Oct 29 00:35:34.269000 audit: BPF prog-id=25 op=LOAD Oct 29 00:35:34.269000 audit: BPF prog-id=26 op=LOAD Oct 29 00:35:34.271945 systemd[1]: Starting systemd-userdbd.service... Oct 29 00:35:34.282268 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 29 00:35:34.305363 systemd[1]: Started systemd-userdbd.service. Oct 29 00:35:34.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.341299 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 00:35:34.362158 systemd-networkd[1051]: lo: Link UP Oct 29 00:35:34.362170 systemd-networkd[1051]: lo: Gained carrier Oct 29 00:35:34.362596 systemd-networkd[1051]: Enumeration completed Oct 29 00:35:34.362717 systemd[1]: Started systemd-networkd.service. Oct 29 00:35:34.362775 systemd-networkd[1051]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 00:35:34.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.364148 systemd-networkd[1051]: eth0: Link UP Oct 29 00:35:34.364159 systemd-networkd[1051]: eth0: Gained carrier Oct 29 00:35:34.374942 systemd[1]: Finished systemd-udev-settle.service. Oct 29 00:35:34.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.377004 systemd[1]: Starting lvm2-activation-early.service... Oct 29 00:35:34.385845 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 00:35:34.390667 systemd-networkd[1051]: eth0: DHCPv4 address 10.0.0.84/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 29 00:35:34.415402 systemd[1]: Finished lvm2-activation-early.service. Oct 29 00:35:34.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.416507 systemd[1]: Reached target cryptsetup.target. Oct 29 00:35:34.418569 systemd[1]: Starting lvm2-activation.service... Oct 29 00:35:34.422474 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 00:35:34.456047 systemd[1]: Finished lvm2-activation.service. Oct 29 00:35:34.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.457078 systemd[1]: Reached target local-fs-pre.target. Oct 29 00:35:34.457942 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 29 00:35:34.457972 systemd[1]: Reached target local-fs.target. Oct 29 00:35:34.458783 systemd[1]: Reached target machines.target. Oct 29 00:35:34.460829 systemd[1]: Starting ldconfig.service... Oct 29 00:35:34.462658 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 00:35:34.462712 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 00:35:34.464020 systemd[1]: Starting systemd-boot-update.service... Oct 29 00:35:34.466131 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 29 00:35:34.468552 systemd[1]: Starting systemd-machine-id-commit.service... Oct 29 00:35:34.470553 systemd[1]: Starting systemd-sysext.service... Oct 29 00:35:34.471693 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) Oct 29 00:35:34.472965 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 29 00:35:34.486278 systemd[1]: Unmounting usr-share-oem.mount... Oct 29 00:35:34.487923 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 29 00:35:34.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.490133 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 29 00:35:34.490364 systemd[1]: Unmounted usr-share-oem.mount. Oct 29 00:35:34.508544 kernel: loop0: detected capacity change from 0 to 207008 Oct 29 00:35:34.551040 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 29 00:35:34.551670 systemd[1]: Finished systemd-machine-id-commit.service. Oct 29 00:35:34.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.558551 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 29 00:35:34.559359 systemd-fsck[1082]: fsck.fat 4.2 (2021-01-31) Oct 29 00:35:34.559359 systemd-fsck[1082]: /dev/vda1: 236 files, 117310/258078 clusters Oct 29 00:35:34.562902 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 29 00:35:34.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.565706 systemd[1]: Mounting boot.mount... Oct 29 00:35:34.576534 kernel: loop1: detected capacity change from 0 to 207008 Oct 29 00:35:34.577816 systemd[1]: Mounted boot.mount. Oct 29 00:35:34.581740 (sd-sysext)[1086]: Using extensions 'kubernetes'. Oct 29 00:35:34.582079 (sd-sysext)[1086]: Merged extensions into '/usr'. Oct 29 00:35:34.586788 systemd[1]: Finished systemd-boot-update.service. Oct 29 00:35:34.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.601982 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 00:35:34.603481 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 00:35:34.605719 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 00:35:34.607876 systemd[1]: Starting modprobe@loop.service... Oct 29 00:35:34.608859 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 00:35:34.608992 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 00:35:34.609878 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 00:35:34.610018 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 00:35:34.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.611725 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 00:35:34.611850 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 00:35:34.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.613634 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 00:35:34.613822 systemd[1]: Finished modprobe@loop.service. Oct 29 00:35:34.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.615277 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 00:35:34.615382 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 00:35:34.661329 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 29 00:35:34.665849 systemd[1]: Finished ldconfig.service. Oct 29 00:35:34.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.773683 systemd[1]: Mounting usr-share-oem.mount... Oct 29 00:35:34.778937 systemd[1]: Mounted usr-share-oem.mount. Oct 29 00:35:34.780897 systemd[1]: Finished systemd-sysext.service. Oct 29 00:35:34.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.783156 systemd[1]: Starting ensure-sysext.service... Oct 29 00:35:34.785093 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 29 00:35:34.789886 systemd[1]: Reloading. Oct 29 00:35:34.798844 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 29 00:35:34.801638 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 29 00:35:34.805809 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 29 00:35:34.833830 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-10-29T00:35:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 00:35:34.833859 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-10-29T00:35:34Z" level=info msg="torcx already run" Oct 29 00:35:34.900511 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 00:35:34.900546 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 00:35:34.916605 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 00:35:34.958000 audit: BPF prog-id=27 op=LOAD Oct 29 00:35:34.958000 audit: BPF prog-id=24 op=UNLOAD Oct 29 00:35:34.958000 audit: BPF prog-id=28 op=LOAD Oct 29 00:35:34.958000 audit: BPF prog-id=29 op=LOAD Oct 29 00:35:34.958000 audit: BPF prog-id=25 op=UNLOAD Oct 29 00:35:34.958000 audit: BPF prog-id=26 op=UNLOAD Oct 29 00:35:34.958000 audit: BPF prog-id=30 op=LOAD Oct 29 00:35:34.959000 audit: BPF prog-id=31 op=LOAD Oct 29 00:35:34.959000 audit: BPF prog-id=21 op=UNLOAD Oct 29 00:35:34.959000 audit: BPF prog-id=22 op=UNLOAD Oct 29 00:35:34.959000 audit: BPF prog-id=32 op=LOAD Oct 29 00:35:34.959000 audit: BPF prog-id=23 op=UNLOAD Oct 29 00:35:34.960000 audit: BPF prog-id=33 op=LOAD Oct 29 00:35:34.960000 audit: BPF prog-id=18 op=UNLOAD Oct 29 00:35:34.960000 audit: BPF prog-id=34 op=LOAD Oct 29 00:35:34.960000 audit: BPF prog-id=35 op=LOAD Oct 29 00:35:34.960000 audit: BPF prog-id=19 op=UNLOAD Oct 29 00:35:34.960000 audit: BPF prog-id=20 op=UNLOAD Oct 29 00:35:34.964678 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 29 00:35:34.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.969063 systemd[1]: Starting audit-rules.service... Oct 29 00:35:34.971035 systemd[1]: Starting clean-ca-certificates.service... Oct 29 00:35:34.974000 audit: BPF prog-id=36 op=LOAD Oct 29 00:35:34.976000 audit: BPF prog-id=37 op=LOAD Oct 29 00:35:34.973178 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 29 00:35:34.975604 systemd[1]: Starting systemd-resolved.service... Oct 29 00:35:34.977823 systemd[1]: Starting systemd-timesyncd.service... Oct 29 00:35:34.979718 systemd[1]: Starting systemd-update-utmp.service... Oct 29 00:35:34.981117 systemd[1]: Finished clean-ca-certificates.service. Oct 29 00:35:34.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.984000 audit[1163]: SYSTEM_BOOT pid=1163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.984058 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 00:35:34.987229 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 00:35:34.988525 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 00:35:34.990444 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 00:35:34.992467 systemd[1]: Starting modprobe@loop.service... Oct 29 00:35:34.993289 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 00:35:34.993475 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 00:35:34.993637 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 00:35:34.994942 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 29 00:35:34.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.996432 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 00:35:34.996568 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 00:35:34.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.997849 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 00:35:34.997956 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 00:35:34.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:34.999313 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 00:35:34.999436 systemd[1]: Finished modprobe@loop.service. Oct 29 00:35:35.000992 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 00:35:35.001124 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.002440 systemd[1]: Starting systemd-update-done.service... Oct 29 00:35:35.004024 systemd[1]: Finished systemd-update-utmp.service. Oct 29 00:35:35.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.007228 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.008503 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 00:35:35.010498 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 00:35:35.013400 systemd[1]: Starting modprobe@loop.service... Oct 29 00:35:35.014253 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.014374 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 00:35:35.014466 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 00:35:35.015347 systemd[1]: Finished systemd-update-done.service. Oct 29 00:35:35.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.016729 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 00:35:35.016843 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 00:35:35.018036 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 00:35:35.018155 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 00:35:35.019400 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 00:35:35.019538 systemd[1]: Finished modprobe@loop.service. Oct 29 00:35:35.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.022798 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.024192 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 00:35:35.027754 systemd[1]: Starting modprobe@drm.service... Oct 29 00:35:35.029822 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 00:35:35.032172 systemd[1]: Starting modprobe@loop.service... Oct 29 00:35:35.033134 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.033277 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 00:35:35.034494 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 29 00:35:35.035709 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 00:35:35.036792 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 00:35:35.036935 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 00:35:35.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.038358 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 00:35:35.038479 systemd[1]: Finished modprobe@drm.service. Oct 29 00:35:35.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.039935 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 00:35:35.040227 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 00:35:35.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.041476 systemd-resolved[1161]: Positive Trust Anchors: Oct 29 00:35:35.041487 systemd-resolved[1161]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 00:35:35.041525 systemd-resolved[1161]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 00:35:35.041880 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 00:35:35.042003 systemd[1]: Finished modprobe@loop.service. Oct 29 00:35:35.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:35.043000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 29 00:35:35.043000 audit[1184]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd82077d0 a2=420 a3=0 items=0 ppid=1152 pid=1184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:35.043000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 29 00:35:35.044765 augenrules[1184]: No rules Oct 29 00:35:35.045005 systemd[1]: Finished ensure-sysext.service. Oct 29 00:35:35.046253 systemd[1]: Started systemd-timesyncd.service. Oct 29 00:35:35.047670 systemd[1]: Finished audit-rules.service. Oct 29 00:35:35.047936 systemd-timesyncd[1162]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 29 00:35:35.048002 systemd-timesyncd[1162]: Initial clock synchronization to Wed 2025-10-29 00:35:34.801976 UTC. Oct 29 00:35:35.049438 systemd[1]: Reached target time-set.target. Oct 29 00:35:35.050487 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 00:35:35.050536 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.052595 systemd-resolved[1161]: Defaulting to hostname 'linux'. Oct 29 00:35:35.054232 systemd[1]: Started systemd-resolved.service. Oct 29 00:35:35.055271 systemd[1]: Reached target network.target. Oct 29 00:35:35.056138 systemd[1]: Reached target nss-lookup.target. Oct 29 00:35:35.056985 systemd[1]: Reached target sysinit.target. Oct 29 00:35:35.057835 systemd[1]: Started motdgen.path. Oct 29 00:35:35.058564 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 29 00:35:35.059768 systemd[1]: Started logrotate.timer. Oct 29 00:35:35.060658 systemd[1]: Started mdadm.timer. Oct 29 00:35:35.061317 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 29 00:35:35.062183 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 29 00:35:35.062228 systemd[1]: Reached target paths.target. Oct 29 00:35:35.062973 systemd[1]: Reached target timers.target. Oct 29 00:35:35.064125 systemd[1]: Listening on dbus.socket. Oct 29 00:35:35.065991 systemd[1]: Starting docker.socket... Oct 29 00:35:35.070871 systemd[1]: Listening on sshd.socket. Oct 29 00:35:35.071702 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 00:35:35.072173 systemd[1]: Listening on docker.socket. Oct 29 00:35:35.073003 systemd[1]: Reached target sockets.target. Oct 29 00:35:35.073839 systemd[1]: Reached target basic.target. Oct 29 00:35:35.074612 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.074644 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 00:35:35.075831 systemd[1]: Starting containerd.service... Oct 29 00:35:35.077704 systemd[1]: Starting dbus.service... Oct 29 00:35:35.079473 systemd[1]: Starting enable-oem-cloudinit.service... Oct 29 00:35:35.081703 systemd[1]: Starting extend-filesystems.service... Oct 29 00:35:35.082744 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 29 00:35:35.083853 systemd[1]: Starting motdgen.service... Oct 29 00:35:35.084557 jq[1194]: false Oct 29 00:35:35.085727 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 29 00:35:35.087826 systemd[1]: Starting sshd-keygen.service... Oct 29 00:35:35.091011 systemd[1]: Starting systemd-logind.service... Oct 29 00:35:35.092148 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 00:35:35.092296 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 29 00:35:35.092792 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 29 00:35:35.094670 systemd[1]: Starting update-engine.service... Oct 29 00:35:35.096584 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 29 00:35:35.097099 extend-filesystems[1195]: Found loop1 Oct 29 00:35:35.097099 extend-filesystems[1195]: Found vda Oct 29 00:35:35.099719 extend-filesystems[1195]: Found vda1 Oct 29 00:35:35.099719 extend-filesystems[1195]: Found vda2 Oct 29 00:35:35.099719 extend-filesystems[1195]: Found vda3 Oct 29 00:35:35.099719 extend-filesystems[1195]: Found usr Oct 29 00:35:35.099719 extend-filesystems[1195]: Found vda4 Oct 29 00:35:35.099719 extend-filesystems[1195]: Found vda6 Oct 29 00:35:35.099719 extend-filesystems[1195]: Found vda7 Oct 29 00:35:35.099719 extend-filesystems[1195]: Found vda9 Oct 29 00:35:35.099719 extend-filesystems[1195]: Checking size of /dev/vda9 Oct 29 00:35:35.117188 jq[1206]: true Oct 29 00:35:35.100789 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 29 00:35:35.101014 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 29 00:35:35.105491 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 29 00:35:35.105664 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 29 00:35:35.118729 jq[1216]: true Oct 29 00:35:35.114445 systemd[1]: motdgen.service: Deactivated successfully. Oct 29 00:35:35.114667 systemd[1]: Finished motdgen.service. Oct 29 00:35:35.124443 dbus-daemon[1193]: [system] SELinux support is enabled Oct 29 00:35:35.124643 systemd[1]: Started dbus.service. Oct 29 00:35:35.127229 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 29 00:35:35.127252 systemd[1]: Reached target system-config.target. Oct 29 00:35:35.128317 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 29 00:35:35.128338 systemd[1]: Reached target user-config.target. Oct 29 00:35:35.141339 extend-filesystems[1195]: Resized partition /dev/vda9 Oct 29 00:35:35.142879 extend-filesystems[1239]: resize2fs 1.46.5 (30-Dec-2021) Oct 29 00:35:35.149819 update_engine[1205]: I1029 00:35:35.147876 1205 main.cc:92] Flatcar Update Engine starting Oct 29 00:35:35.152537 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Oct 29 00:35:35.155855 systemd[1]: Started update-engine.service. Oct 29 00:35:35.175184 update_engine[1205]: I1029 00:35:35.155893 1205 update_check_scheduler.cc:74] Next update check in 6m12s Oct 29 00:35:35.159769 systemd[1]: Started locksmithd.service. Oct 29 00:35:35.182543 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Oct 29 00:35:35.183987 bash[1240]: Updated "/home/core/.ssh/authorized_keys" Oct 29 00:35:35.184851 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 29 00:35:35.201235 extend-filesystems[1239]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 29 00:35:35.201235 extend-filesystems[1239]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 29 00:35:35.201235 extend-filesystems[1239]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Oct 29 00:35:35.201045 systemd-logind[1202]: Watching system buttons on /dev/input/event0 (Power Button) Oct 29 00:35:35.209151 env[1217]: time="2025-10-29T00:35:35.202531680Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 29 00:35:35.209416 extend-filesystems[1195]: Resized filesystem in /dev/vda9 Oct 29 00:35:35.201291 systemd-logind[1202]: New seat seat0. Oct 29 00:35:35.203872 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 29 00:35:35.204045 systemd[1]: Finished extend-filesystems.service. Oct 29 00:35:35.206657 systemd[1]: Started systemd-logind.service. Oct 29 00:35:35.214416 locksmithd[1242]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 29 00:35:35.221396 env[1217]: time="2025-10-29T00:35:35.221350640Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 29 00:35:35.221668 env[1217]: time="2025-10-29T00:35:35.221646120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 29 00:35:35.223066 env[1217]: time="2025-10-29T00:35:35.223032840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 29 00:35:35.223168 env[1217]: time="2025-10-29T00:35:35.223152080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 29 00:35:35.223466 env[1217]: time="2025-10-29T00:35:35.223439680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 00:35:35.223559 env[1217]: time="2025-10-29T00:35:35.223543600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 29 00:35:35.223618 env[1217]: time="2025-10-29T00:35:35.223603600Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 29 00:35:35.223668 env[1217]: time="2025-10-29T00:35:35.223655920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 29 00:35:35.223809 env[1217]: time="2025-10-29T00:35:35.223792280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 29 00:35:35.224089 env[1217]: time="2025-10-29T00:35:35.224066560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 29 00:35:35.224318 env[1217]: time="2025-10-29T00:35:35.224293760Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 00:35:35.224391 env[1217]: time="2025-10-29T00:35:35.224377040Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 29 00:35:35.224506 env[1217]: time="2025-10-29T00:35:35.224484880Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 29 00:35:35.224638 env[1217]: time="2025-10-29T00:35:35.224621480Z" level=info msg="metadata content store policy set" policy=shared Oct 29 00:35:35.228683 env[1217]: time="2025-10-29T00:35:35.228656320Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 29 00:35:35.228787 env[1217]: time="2025-10-29T00:35:35.228771600Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 29 00:35:35.228850 env[1217]: time="2025-10-29T00:35:35.228836640Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 29 00:35:35.228963 env[1217]: time="2025-10-29T00:35:35.228945400Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229030 env[1217]: time="2025-10-29T00:35:35.229017480Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229087 env[1217]: time="2025-10-29T00:35:35.229074720Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229141 env[1217]: time="2025-10-29T00:35:35.229128960Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229567 env[1217]: time="2025-10-29T00:35:35.229537800Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229672 env[1217]: time="2025-10-29T00:35:35.229655880Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229732 env[1217]: time="2025-10-29T00:35:35.229719080Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229785 env[1217]: time="2025-10-29T00:35:35.229773200Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.229839 env[1217]: time="2025-10-29T00:35:35.229826080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 29 00:35:35.230002 env[1217]: time="2025-10-29T00:35:35.229983200Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 29 00:35:35.230154 env[1217]: time="2025-10-29T00:35:35.230136480Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 29 00:35:35.230459 env[1217]: time="2025-10-29T00:35:35.230435560Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 29 00:35:35.230614 env[1217]: time="2025-10-29T00:35:35.230597080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.230684 env[1217]: time="2025-10-29T00:35:35.230669880Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 29 00:35:35.230853 env[1217]: time="2025-10-29T00:35:35.230837320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.230912 env[1217]: time="2025-10-29T00:35:35.230899720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.230967 env[1217]: time="2025-10-29T00:35:35.230954600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231036 env[1217]: time="2025-10-29T00:35:35.231022280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231093 env[1217]: time="2025-10-29T00:35:35.231080600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231146 env[1217]: time="2025-10-29T00:35:35.231134080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231209 env[1217]: time="2025-10-29T00:35:35.231187320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231290 env[1217]: time="2025-10-29T00:35:35.231276120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231374 env[1217]: time="2025-10-29T00:35:35.231360520Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 29 00:35:35.231614 env[1217]: time="2025-10-29T00:35:35.231596720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231700 env[1217]: time="2025-10-29T00:35:35.231685920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231767 env[1217]: time="2025-10-29T00:35:35.231755000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.231834 env[1217]: time="2025-10-29T00:35:35.231812440Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 29 00:35:35.231921 env[1217]: time="2025-10-29T00:35:35.231892240Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 29 00:35:35.231976 env[1217]: time="2025-10-29T00:35:35.231963520Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 29 00:35:35.232045 env[1217]: time="2025-10-29T00:35:35.232032600Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 29 00:35:35.232129 env[1217]: time="2025-10-29T00:35:35.232116640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 29 00:35:35.232451 env[1217]: time="2025-10-29T00:35:35.232393000Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 29 00:35:35.233093 env[1217]: time="2025-10-29T00:35:35.232789320Z" level=info msg="Connect containerd service" Oct 29 00:35:35.233093 env[1217]: time="2025-10-29T00:35:35.232829080Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 29 00:35:35.233849 env[1217]: time="2025-10-29T00:35:35.233824960Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 00:35:35.234155 env[1217]: time="2025-10-29T00:35:35.234117520Z" level=info msg="Start subscribing containerd event" Oct 29 00:35:35.234198 env[1217]: time="2025-10-29T00:35:35.234173680Z" level=info msg="Start recovering state" Oct 29 00:35:35.234259 env[1217]: time="2025-10-29T00:35:35.234243360Z" level=info msg="Start event monitor" Oct 29 00:35:35.234303 env[1217]: time="2025-10-29T00:35:35.234269640Z" level=info msg="Start snapshots syncer" Oct 29 00:35:35.234303 env[1217]: time="2025-10-29T00:35:35.234281040Z" level=info msg="Start cni network conf syncer for default" Oct 29 00:35:35.234303 env[1217]: time="2025-10-29T00:35:35.234289520Z" level=info msg="Start streaming server" Oct 29 00:35:35.235295 env[1217]: time="2025-10-29T00:35:35.235269480Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 29 00:35:35.235509 env[1217]: time="2025-10-29T00:35:35.235492160Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 29 00:35:35.235723 systemd[1]: Started containerd.service. Oct 29 00:35:35.236850 env[1217]: time="2025-10-29T00:35:35.236570040Z" level=info msg="containerd successfully booted in 0.048411s" Oct 29 00:35:36.205714 systemd-networkd[1051]: eth0: Gained IPv6LL Oct 29 00:35:36.207365 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 29 00:35:36.208704 systemd[1]: Reached target network-online.target. Oct 29 00:35:36.211331 systemd[1]: Starting kubelet.service... Oct 29 00:35:36.819155 systemd[1]: Started kubelet.service. Oct 29 00:35:37.181448 kubelet[1257]: E1029 00:35:37.181358 1257 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 00:35:37.183894 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 00:35:37.184009 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 00:35:37.275803 sshd_keygen[1211]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 29 00:35:37.293269 systemd[1]: Finished sshd-keygen.service. Oct 29 00:35:37.295570 systemd[1]: Starting issuegen.service... Oct 29 00:35:37.299981 systemd[1]: issuegen.service: Deactivated successfully. Oct 29 00:35:37.300139 systemd[1]: Finished issuegen.service. Oct 29 00:35:37.302320 systemd[1]: Starting systemd-user-sessions.service... Oct 29 00:35:37.308167 systemd[1]: Finished systemd-user-sessions.service. Oct 29 00:35:37.310413 systemd[1]: Started getty@tty1.service. Oct 29 00:35:37.312870 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 29 00:35:37.314178 systemd[1]: Reached target getty.target. Oct 29 00:35:37.315195 systemd[1]: Reached target multi-user.target. Oct 29 00:35:37.317539 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 29 00:35:37.324387 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 29 00:35:37.324570 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 29 00:35:37.325682 systemd[1]: Startup finished in 596ms (kernel) + 4.137s (initrd) + 5.633s (userspace) = 10.367s. Oct 29 00:35:40.679559 systemd[1]: Created slice system-sshd.slice. Oct 29 00:35:40.680569 systemd[1]: Started sshd@0-10.0.0.84:22-10.0.0.1:60340.service. Oct 29 00:35:40.721946 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 60340 ssh2: RSA SHA256:pYB66aLjdXbBwWKgZ+jLlT0UVkYzJYHWsaqS3PI+gyo Oct 29 00:35:40.724312 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:40.733763 systemd-logind[1202]: New session 1 of user core. Oct 29 00:35:40.735559 systemd[1]: Created slice user-500.slice. Oct 29 00:35:40.736715 systemd[1]: Starting user-runtime-dir@500.service... Oct 29 00:35:40.745449 systemd[1]: Finished user-runtime-dir@500.service. Oct 29 00:35:40.747026 systemd[1]: Starting user@500.service... Oct 29 00:35:40.749837 (systemd)[1282]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:40.813327 systemd[1282]: Queued start job for default target default.target. Oct 29 00:35:40.813843 systemd[1282]: Reached target paths.target. Oct 29 00:35:40.813879 systemd[1282]: Reached target sockets.target. Oct 29 00:35:40.813892 systemd[1282]: Reached target timers.target. Oct 29 00:35:40.813902 systemd[1282]: Reached target basic.target. Oct 29 00:35:40.813942 systemd[1282]: Reached target default.target. Oct 29 00:35:40.813967 systemd[1282]: Startup finished in 58ms. Oct 29 00:35:40.814409 systemd[1]: Started user@500.service. Oct 29 00:35:40.815948 systemd[1]: Started session-1.scope. Oct 29 00:35:40.867492 systemd[1]: Started sshd@1-10.0.0.84:22-10.0.0.1:60356.service. Oct 29 00:35:40.911976 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 60356 ssh2: RSA SHA256:pYB66aLjdXbBwWKgZ+jLlT0UVkYzJYHWsaqS3PI+gyo Oct 29 00:35:40.913060 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:40.916560 systemd-logind[1202]: New session 2 of user core. Oct 29 00:35:40.917715 systemd[1]: Started session-2.scope. Oct 29 00:35:40.974687 sshd[1291]: pam_unix(sshd:session): session closed for user core Oct 29 00:35:40.977470 systemd[1]: sshd@1-10.0.0.84:22-10.0.0.1:60356.service: Deactivated successfully. Oct 29 00:35:40.978131 systemd[1]: session-2.scope: Deactivated successfully. Oct 29 00:35:40.978658 systemd-logind[1202]: Session 2 logged out. Waiting for processes to exit. Oct 29 00:35:40.979793 systemd[1]: Started sshd@2-10.0.0.84:22-10.0.0.1:60366.service. Oct 29 00:35:40.980634 systemd-logind[1202]: Removed session 2. Oct 29 00:35:41.012014 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 60366 ssh2: RSA SHA256:pYB66aLjdXbBwWKgZ+jLlT0UVkYzJYHWsaqS3PI+gyo Oct 29 00:35:41.013266 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:41.016670 systemd-logind[1202]: New session 3 of user core. Oct 29 00:35:41.017473 systemd[1]: Started session-3.scope. Oct 29 00:35:41.066679 sshd[1297]: pam_unix(sshd:session): session closed for user core Oct 29 00:35:41.069562 systemd[1]: sshd@2-10.0.0.84:22-10.0.0.1:60366.service: Deactivated successfully. Oct 29 00:35:41.070152 systemd[1]: session-3.scope: Deactivated successfully. Oct 29 00:35:41.070826 systemd-logind[1202]: Session 3 logged out. Waiting for processes to exit. Oct 29 00:35:41.072343 systemd[1]: Started sshd@3-10.0.0.84:22-10.0.0.1:60380.service. Oct 29 00:35:41.073120 systemd-logind[1202]: Removed session 3. Oct 29 00:35:41.106278 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 60380 ssh2: RSA SHA256:pYB66aLjdXbBwWKgZ+jLlT0UVkYzJYHWsaqS3PI+gyo Oct 29 00:35:41.107555 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:41.110723 systemd-logind[1202]: New session 4 of user core. Oct 29 00:35:41.111543 systemd[1]: Started session-4.scope. Oct 29 00:35:41.166116 sshd[1303]: pam_unix(sshd:session): session closed for user core Oct 29 00:35:41.170448 systemd[1]: sshd@3-10.0.0.84:22-10.0.0.1:60380.service: Deactivated successfully. Oct 29 00:35:41.171697 systemd[1]: session-4.scope: Deactivated successfully. Oct 29 00:35:41.172508 systemd-logind[1202]: Session 4 logged out. Waiting for processes to exit. Oct 29 00:35:41.174019 systemd[1]: Started sshd@4-10.0.0.84:22-10.0.0.1:60392.service. Oct 29 00:35:41.175106 systemd-logind[1202]: Removed session 4. Oct 29 00:35:41.207563 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 60392 ssh2: RSA SHA256:pYB66aLjdXbBwWKgZ+jLlT0UVkYzJYHWsaqS3PI+gyo Oct 29 00:35:41.209174 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:41.212850 systemd-logind[1202]: New session 5 of user core. Oct 29 00:35:41.214667 systemd[1]: Started session-5.scope. Oct 29 00:35:41.274685 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 29 00:35:41.274925 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 00:35:41.293878 dbus-daemon[1193]: avc: received setenforce notice (enforcing=1) Oct 29 00:35:41.295435 sudo[1312]: pam_unix(sudo:session): session closed for user root Oct 29 00:35:41.299539 sshd[1309]: pam_unix(sshd:session): session closed for user core Oct 29 00:35:41.303401 systemd[1]: Started sshd@5-10.0.0.84:22-10.0.0.1:60404.service. Oct 29 00:35:41.304288 systemd[1]: sshd@4-10.0.0.84:22-10.0.0.1:60392.service: Deactivated successfully. Oct 29 00:35:41.305121 systemd[1]: session-5.scope: Deactivated successfully. Oct 29 00:35:41.306025 systemd-logind[1202]: Session 5 logged out. Waiting for processes to exit. Oct 29 00:35:41.307040 systemd-logind[1202]: Removed session 5. Oct 29 00:35:41.341466 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 60404 ssh2: RSA SHA256:pYB66aLjdXbBwWKgZ+jLlT0UVkYzJYHWsaqS3PI+gyo Oct 29 00:35:41.342882 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:41.346922 systemd-logind[1202]: New session 6 of user core. Oct 29 00:35:41.347512 systemd[1]: Started session-6.scope. Oct 29 00:35:41.400905 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 29 00:35:41.401396 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 00:35:41.404172 sudo[1320]: pam_unix(sudo:session): session closed for user root Oct 29 00:35:41.408732 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 29 00:35:41.408963 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 00:35:41.418305 systemd[1]: Stopping audit-rules.service... Oct 29 00:35:41.419000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 00:35:41.419682 auditctl[1323]: No rules Oct 29 00:35:41.420038 systemd[1]: audit-rules.service: Deactivated successfully. Oct 29 00:35:41.420200 systemd[1]: Stopped audit-rules.service. Oct 29 00:35:41.421742 systemd[1]: Starting audit-rules.service... Oct 29 00:35:41.422144 kernel: kauditd_printk_skb: 118 callbacks suppressed Oct 29 00:35:41.422172 kernel: audit: type=1305 audit(1761698141.419:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 00:35:41.422191 kernel: audit: type=1300 audit(1761698141.419:210): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff4b23780 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:41.419000 audit[1323]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff4b23780 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:41.425937 kernel: audit: type=1327 audit(1761698141.419:210): proctitle=2F7362696E2F617564697463746C002D44 Oct 29 00:35:41.419000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 29 00:35:41.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.429503 kernel: audit: type=1131 audit(1761698141.419:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.437903 augenrules[1340]: No rules Oct 29 00:35:41.438712 systemd[1]: Finished audit-rules.service. Oct 29 00:35:41.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.439542 sudo[1319]: pam_unix(sudo:session): session closed for user root Oct 29 00:35:41.439000 audit[1319]: USER_END pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.441908 sshd[1315]: pam_unix(sshd:session): session closed for user core Oct 29 00:35:41.444212 systemd[1]: sshd@5-10.0.0.84:22-10.0.0.1:60404.service: Deactivated successfully. Oct 29 00:35:41.444862 kernel: audit: type=1130 audit(1761698141.438:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.444909 kernel: audit: type=1106 audit(1761698141.439:213): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.444926 kernel: audit: type=1104 audit(1761698141.439:214): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.439000 audit[1319]: CRED_DISP pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.444853 systemd[1]: session-6.scope: Deactivated successfully. Oct 29 00:35:41.445322 systemd-logind[1202]: Session 6 logged out. Waiting for processes to exit. Oct 29 00:35:41.446293 systemd[1]: Started sshd@6-10.0.0.84:22-10.0.0.1:60412.service. Oct 29 00:35:41.446893 systemd-logind[1202]: Removed session 6. Oct 29 00:35:41.442000 audit[1315]: USER_END pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.450817 kernel: audit: type=1106 audit(1761698141.442:215): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.450877 kernel: audit: type=1104 audit(1761698141.442:216): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.442000 audit[1315]: CRED_DISP pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.84:22-10.0.0.1:60404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.456114 kernel: audit: type=1131 audit(1761698141.443:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.84:22-10.0.0.1:60404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:60412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.479000 audit[1346]: USER_ACCT pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.480016 sshd[1346]: Accepted publickey for core from 10.0.0.1 port 60412 ssh2: RSA SHA256:pYB66aLjdXbBwWKgZ+jLlT0UVkYzJYHWsaqS3PI+gyo Oct 29 00:35:41.480000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.480000 audit[1346]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd94148a0 a2=3 a3=1 items=0 ppid=1 pid=1346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:41.480000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 00:35:41.481340 sshd[1346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 00:35:41.484901 systemd-logind[1202]: New session 7 of user core. Oct 29 00:35:41.485707 systemd[1]: Started session-7.scope. Oct 29 00:35:41.488000 audit[1346]: USER_START pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.489000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:41.534000 audit[1349]: USER_ACCT pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.534000 audit[1349]: CRED_REFR pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.535999 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 29 00:35:41.536219 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 00:35:41.537000 audit[1349]: USER_START pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.548073 systemd[1]: Starting coreos-metadata.service... Oct 29 00:35:41.554285 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 29 00:35:41.554471 systemd[1]: Finished coreos-metadata.service. Oct 29 00:35:41.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:41.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:42.021474 systemd[1]: Stopped kubelet.service. Oct 29 00:35:42.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:42.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:42.023984 systemd[1]: Starting kubelet.service... Oct 29 00:35:42.048718 systemd[1]: Reloading. Oct 29 00:35:42.106984 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2025-10-29T00:35:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 00:35:42.107280 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2025-10-29T00:35:42Z" level=info msg="torcx already run" Oct 29 00:35:42.261381 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 00:35:42.261403 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 00:35:42.276679 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit: BPF prog-id=43 op=LOAD Oct 29 00:35:42.324000 audit: BPF prog-id=27 op=UNLOAD Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit: BPF prog-id=44 op=LOAD Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.324000 audit: BPF prog-id=45 op=LOAD Oct 29 00:35:42.324000 audit: BPF prog-id=28 op=UNLOAD Oct 29 00:35:42.324000 audit: BPF prog-id=29 op=UNLOAD Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit: BPF prog-id=46 op=LOAD Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit: BPF prog-id=47 op=LOAD Oct 29 00:35:42.325000 audit: BPF prog-id=30 op=UNLOAD Oct 29 00:35:42.325000 audit: BPF prog-id=31 op=UNLOAD Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit: BPF prog-id=48 op=LOAD Oct 29 00:35:42.326000 audit: BPF prog-id=32 op=UNLOAD Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.326000 audit: BPF prog-id=49 op=LOAD Oct 29 00:35:42.326000 audit: BPF prog-id=37 op=UNLOAD Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit: BPF prog-id=50 op=LOAD Oct 29 00:35:42.328000 audit: BPF prog-id=36 op=UNLOAD Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit: BPF prog-id=51 op=LOAD Oct 29 00:35:42.329000 audit: BPF prog-id=33 op=UNLOAD Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit: BPF prog-id=52 op=LOAD Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.329000 audit: BPF prog-id=53 op=LOAD Oct 29 00:35:42.329000 audit: BPF prog-id=34 op=UNLOAD Oct 29 00:35:42.329000 audit: BPF prog-id=35 op=UNLOAD Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit: BPF prog-id=54 op=LOAD Oct 29 00:35:42.332000 audit: BPF prog-id=41 op=UNLOAD Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit: BPF prog-id=55 op=LOAD Oct 29 00:35:42.332000 audit: BPF prog-id=38 op=UNLOAD Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit: BPF prog-id=56 op=LOAD Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:42.332000 audit: BPF prog-id=57 op=LOAD Oct 29 00:35:42.332000 audit: BPF prog-id=39 op=UNLOAD Oct 29 00:35:42.332000 audit: BPF prog-id=40 op=UNLOAD Oct 29 00:35:42.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:42.343446 systemd[1]: Started kubelet.service. Oct 29 00:35:42.345634 systemd[1]: Stopping kubelet.service... Oct 29 00:35:42.346138 systemd[1]: kubelet.service: Deactivated successfully. Oct 29 00:35:42.346335 systemd[1]: Stopped kubelet.service. Oct 29 00:35:42.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:42.348298 systemd[1]: Starting kubelet.service... Oct 29 00:35:42.440684 systemd[1]: Started kubelet.service. Oct 29 00:35:42.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:42.471718 kubelet[1453]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 00:35:42.471718 kubelet[1453]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 29 00:35:42.471718 kubelet[1453]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 00:35:42.472078 kubelet[1453]: I1029 00:35:42.471767 1453 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 29 00:35:43.228971 kubelet[1453]: I1029 00:35:43.228919 1453 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 29 00:35:43.228971 kubelet[1453]: I1029 00:35:43.228958 1453 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 29 00:35:43.229262 kubelet[1453]: I1029 00:35:43.229230 1453 server.go:954] "Client rotation is on, will bootstrap in background" Oct 29 00:35:43.269343 kubelet[1453]: I1029 00:35:43.269294 1453 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 29 00:35:43.281163 kubelet[1453]: E1029 00:35:43.281117 1453 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 29 00:35:43.281163 kubelet[1453]: I1029 00:35:43.281154 1453 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 29 00:35:43.286129 kubelet[1453]: I1029 00:35:43.286100 1453 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 29 00:35:43.289127 kubelet[1453]: I1029 00:35:43.289062 1453 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 29 00:35:43.289300 kubelet[1453]: I1029 00:35:43.289120 1453 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.84","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 29 00:35:43.289407 kubelet[1453]: I1029 00:35:43.289390 1453 topology_manager.go:138] "Creating topology manager with none policy" Oct 29 00:35:43.289407 kubelet[1453]: I1029 00:35:43.289401 1453 container_manager_linux.go:304] "Creating device plugin manager" Oct 29 00:35:43.289666 kubelet[1453]: I1029 00:35:43.289650 1453 state_mem.go:36] "Initialized new in-memory state store" Oct 29 00:35:43.292659 kubelet[1453]: I1029 00:35:43.292628 1453 kubelet.go:446] "Attempting to sync node with API server" Oct 29 00:35:43.292659 kubelet[1453]: I1029 00:35:43.292657 1453 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 29 00:35:43.292756 kubelet[1453]: I1029 00:35:43.292679 1453 kubelet.go:352] "Adding apiserver pod source" Oct 29 00:35:43.292756 kubelet[1453]: I1029 00:35:43.292697 1453 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 29 00:35:43.292894 kubelet[1453]: E1029 00:35:43.292872 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:43.292977 kubelet[1453]: E1029 00:35:43.292965 1453 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:43.295925 kubelet[1453]: I1029 00:35:43.295905 1453 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 29 00:35:43.296669 kubelet[1453]: I1029 00:35:43.296648 1453 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 29 00:35:43.296848 kubelet[1453]: W1029 00:35:43.296836 1453 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 29 00:35:43.297708 kubelet[1453]: I1029 00:35:43.297688 1453 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 29 00:35:43.297812 kubelet[1453]: I1029 00:35:43.297802 1453 server.go:1287] "Started kubelet" Oct 29 00:35:43.322439 kubelet[1453]: I1029 00:35:43.322206 1453 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 29 00:35:43.322637 kubelet[1453]: W1029 00:35:43.322612 1453 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 29 00:35:43.322675 kubelet[1453]: E1029 00:35:43.322649 1453 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Oct 29 00:35:43.323349 kubelet[1453]: I1029 00:35:43.323310 1453 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 29 00:35:43.323560 kubelet[1453]: I1029 00:35:43.323534 1453 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 29 00:35:43.324319 kubelet[1453]: E1029 00:35:43.324284 1453 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 29 00:35:43.324917 kubelet[1453]: I1029 00:35:43.324899 1453 server.go:479] "Adding debug handlers to kubelet server" Oct 29 00:35:43.325000 audit[1453]: AVC avc: denied { mac_admin } for pid=1453 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:43.325000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 00:35:43.325000 audit[1453]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000917650 a1=40009e48b8 a2=4000917620 a3=25 items=0 ppid=1 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.325000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 00:35:43.326461 kubelet[1453]: I1029 00:35:43.326221 1453 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 29 00:35:43.326000 audit[1453]: AVC avc: denied { mac_admin } for pid=1453 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:43.326000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 00:35:43.326000 audit[1453]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000501200 a1=40009e48d0 a2=40009176e0 a3=25 items=0 ppid=1 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.326000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 00:35:43.327414 kubelet[1453]: I1029 00:35:43.327393 1453 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 29 00:35:43.327612 kubelet[1453]: I1029 00:35:43.327597 1453 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 29 00:35:43.328080 kubelet[1453]: I1029 00:35:43.328007 1453 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 29 00:35:43.328147 kubelet[1453]: I1029 00:35:43.327651 1453 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 29 00:35:43.328262 kubelet[1453]: I1029 00:35:43.328243 1453 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 29 00:35:43.328330 kubelet[1453]: I1029 00:35:43.328320 1453 reconciler.go:26] "Reconciler: start to sync state" Oct 29 00:35:43.329919 kubelet[1453]: E1029 00:35:43.329886 1453 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.84\" not found" Oct 29 00:35:43.330038 kubelet[1453]: I1029 00:35:43.330019 1453 factory.go:221] Registration of the systemd container factory successfully Oct 29 00:35:43.330158 kubelet[1453]: I1029 00:35:43.330141 1453 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 29 00:35:43.331110 kubelet[1453]: I1029 00:35:43.331089 1453 factory.go:221] Registration of the containerd container factory successfully Oct 29 00:35:43.338896 kubelet[1453]: E1029 00:35:43.338859 1453 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.84\" not found" node="10.0.0.84" Oct 29 00:35:43.346462 kubelet[1453]: I1029 00:35:43.346443 1453 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 29 00:35:43.346585 kubelet[1453]: I1029 00:35:43.346571 1453 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 29 00:35:43.346644 kubelet[1453]: I1029 00:35:43.346634 1453 state_mem.go:36] "Initialized new in-memory state store" Oct 29 00:35:43.348593 kubelet[1453]: I1029 00:35:43.348578 1453 policy_none.go:49] "None policy: Start" Oct 29 00:35:43.348724 kubelet[1453]: I1029 00:35:43.348706 1453 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 29 00:35:43.348815 kubelet[1453]: I1029 00:35:43.348804 1453 state_mem.go:35] "Initializing new in-memory state store" Oct 29 00:35:43.357601 systemd[1]: Created slice kubepods.slice. Oct 29 00:35:43.361235 systemd[1]: Created slice kubepods-burstable.slice. Oct 29 00:35:43.363629 systemd[1]: Created slice kubepods-besteffort.slice. Oct 29 00:35:43.362000 audit[1472]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.362000 audit[1472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcb629610 a2=0 a3=1 items=0 ppid=1453 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 00:35:43.364000 audit[1474]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.364000 audit[1474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd423d710 a2=0 a3=1 items=0 ppid=1453 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 00:35:43.372323 kubelet[1453]: I1029 00:35:43.372288 1453 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 29 00:35:43.370000 audit[1453]: AVC avc: denied { mac_admin } for pid=1453 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:43.370000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 00:35:43.370000 audit[1453]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dc36b0 a1=40004b4c78 a2=4000dc3680 a3=25 items=0 ppid=1 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 00:35:43.372551 kubelet[1453]: I1029 00:35:43.372351 1453 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 29 00:35:43.372551 kubelet[1453]: I1029 00:35:43.372458 1453 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 29 00:35:43.372551 kubelet[1453]: I1029 00:35:43.372470 1453 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 29 00:35:43.373019 kubelet[1453]: I1029 00:35:43.372999 1453 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 29 00:35:43.374156 kubelet[1453]: E1029 00:35:43.374130 1453 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 29 00:35:43.374239 kubelet[1453]: E1029 00:35:43.374171 1453 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.84\" not found" Oct 29 00:35:43.366000 audit[1476]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.366000 audit[1476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd5944620 a2=0 a3=1 items=0 ppid=1453 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 00:35:43.394000 audit[1481]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.394000 audit[1481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffec5aedb0 a2=0 a3=1 items=0 ppid=1453 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 00:35:43.422000 audit[1486]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.422000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe1d738c0 a2=0 a3=1 items=0 ppid=1453 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 29 00:35:43.424586 kubelet[1453]: I1029 00:35:43.424546 1453 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 29 00:35:43.423000 audit[1487]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:43.423000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff25900d0 a2=0 a3=1 items=0 ppid=1453 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 00:35:43.423000 audit[1488]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.423000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe802c5e0 a2=0 a3=1 items=0 ppid=1453 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 00:35:43.425697 kubelet[1453]: I1029 00:35:43.425680 1453 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 29 00:35:43.425794 kubelet[1453]: I1029 00:35:43.425785 1453 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 29 00:35:43.425918 kubelet[1453]: I1029 00:35:43.425907 1453 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 29 00:35:43.425000 audit[1490]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:43.425000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffd967a0 a2=0 a3=1 items=0 ppid=1453 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 00:35:43.425000 audit[1489]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.425000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe3a93d00 a2=0 a3=1 items=0 ppid=1453 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 00:35:43.427028 kubelet[1453]: I1029 00:35:43.427018 1453 kubelet.go:2382] "Starting kubelet main sync loop" Oct 29 00:35:43.426000 audit[1491]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:43.426000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc73d8870 a2=0 a3=1 items=0 ppid=1453 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 00:35:43.426000 audit[1492]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:43.426000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffead7e520 a2=0 a3=1 items=0 ppid=1453 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 00:35:43.427000 audit[1493]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:43.427000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdbdd30f0 a2=0 a3=1 items=0 ppid=1453 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:43.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 00:35:43.473811 kubelet[1453]: I1029 00:35:43.473769 1453 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.84" Oct 29 00:35:43.480259 kubelet[1453]: I1029 00:35:43.480170 1453 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.84" Oct 29 00:35:43.492462 kubelet[1453]: I1029 00:35:43.492414 1453 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 29 00:35:43.492870 env[1217]: time="2025-10-29T00:35:43.492778396Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 29 00:35:43.493107 kubelet[1453]: I1029 00:35:43.492948 1453 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 29 00:35:43.967787 sudo[1349]: pam_unix(sudo:session): session closed for user root Oct 29 00:35:43.967000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:43.967000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 00:35:43.969394 sshd[1346]: pam_unix(sshd:session): session closed for user core Oct 29 00:35:43.971000 audit[1346]: USER_END pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:43.971000 audit[1346]: CRED_DISP pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 29 00:35:43.973110 systemd[1]: sshd@6-10.0.0.84:22-10.0.0.1:60412.service: Deactivated successfully. Oct 29 00:35:43.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:60412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 00:35:43.973896 systemd[1]: session-7.scope: Deactivated successfully. Oct 29 00:35:43.975602 systemd-logind[1202]: Session 7 logged out. Waiting for processes to exit. Oct 29 00:35:43.976993 systemd-logind[1202]: Removed session 7. Oct 29 00:35:44.232103 kubelet[1453]: I1029 00:35:44.231664 1453 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 29 00:35:44.232103 kubelet[1453]: W1029 00:35:44.231938 1453 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Oct 29 00:35:44.232103 kubelet[1453]: W1029 00:35:44.231994 1453 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Oct 29 00:35:44.293347 kubelet[1453]: I1029 00:35:44.293280 1453 apiserver.go:52] "Watching apiserver" Oct 29 00:35:44.293347 kubelet[1453]: E1029 00:35:44.293319 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:44.298546 kubelet[1453]: E1029 00:35:44.298493 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:35:44.311244 systemd[1]: Created slice kubepods-besteffort-pod8cff9994_c439_45f9_86a8_0758f95095eb.slice. Oct 29 00:35:44.326412 systemd[1]: Created slice kubepods-besteffort-pode1f409d9_d354_42e1_b880_b6bae647096f.slice. Oct 29 00:35:44.329151 kubelet[1453]: I1029 00:35:44.329118 1453 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 29 00:35:44.338189 kubelet[1453]: I1029 00:35:44.338152 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/259fc121-6a1d-4571-8bc6-9cfbdb3834ad-kubelet-dir\") pod \"csi-node-driver-fg5pv\" (UID: \"259fc121-6a1d-4571-8bc6-9cfbdb3834ad\") " pod="calico-system/csi-node-driver-fg5pv" Oct 29 00:35:44.338355 kubelet[1453]: I1029 00:35:44.338337 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/259fc121-6a1d-4571-8bc6-9cfbdb3834ad-socket-dir\") pod \"csi-node-driver-fg5pv\" (UID: \"259fc121-6a1d-4571-8bc6-9cfbdb3834ad\") " pod="calico-system/csi-node-driver-fg5pv" Oct 29 00:35:44.338498 kubelet[1453]: I1029 00:35:44.338482 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-cni-log-dir\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338608 kubelet[1453]: I1029 00:35:44.338590 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-flexvol-driver-host\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338673 kubelet[1453]: I1029 00:35:44.338661 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8cff9994-c439-45f9-86a8-0758f95095eb-node-certs\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338799 kubelet[1453]: I1029 00:35:44.338742 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-var-run-calico\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338840 kubelet[1453]: I1029 00:35:44.338796 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttvn6\" (UniqueName: \"kubernetes.io/projected/8cff9994-c439-45f9-86a8-0758f95095eb-kube-api-access-ttvn6\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338840 kubelet[1453]: I1029 00:35:44.338825 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/259fc121-6a1d-4571-8bc6-9cfbdb3834ad-registration-dir\") pod \"csi-node-driver-fg5pv\" (UID: \"259fc121-6a1d-4571-8bc6-9cfbdb3834ad\") " pod="calico-system/csi-node-driver-fg5pv" Oct 29 00:35:44.338900 kubelet[1453]: I1029 00:35:44.338843 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e1f409d9-d354-42e1-b880-b6bae647096f-kube-proxy\") pod \"kube-proxy-nlm6d\" (UID: \"e1f409d9-d354-42e1-b880-b6bae647096f\") " pod="kube-system/kube-proxy-nlm6d" Oct 29 00:35:44.338900 kubelet[1453]: I1029 00:35:44.338864 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e1f409d9-d354-42e1-b880-b6bae647096f-xtables-lock\") pod \"kube-proxy-nlm6d\" (UID: \"e1f409d9-d354-42e1-b880-b6bae647096f\") " pod="kube-system/kube-proxy-nlm6d" Oct 29 00:35:44.338900 kubelet[1453]: I1029 00:35:44.338880 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-policysync\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338900 kubelet[1453]: I1029 00:35:44.338895 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/259fc121-6a1d-4571-8bc6-9cfbdb3834ad-varrun\") pod \"csi-node-driver-fg5pv\" (UID: \"259fc121-6a1d-4571-8bc6-9cfbdb3834ad\") " pod="calico-system/csi-node-driver-fg5pv" Oct 29 00:35:44.338995 kubelet[1453]: I1029 00:35:44.338911 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e1f409d9-d354-42e1-b880-b6bae647096f-lib-modules\") pod \"kube-proxy-nlm6d\" (UID: \"e1f409d9-d354-42e1-b880-b6bae647096f\") " pod="kube-system/kube-proxy-nlm6d" Oct 29 00:35:44.338995 kubelet[1453]: I1029 00:35:44.338934 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-cni-net-dir\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338995 kubelet[1453]: I1029 00:35:44.338947 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-lib-modules\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338995 kubelet[1453]: I1029 00:35:44.338971 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-var-lib-calico\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.338995 kubelet[1453]: I1029 00:35:44.338986 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sgfwk\" (UniqueName: \"kubernetes.io/projected/259fc121-6a1d-4571-8bc6-9cfbdb3834ad-kube-api-access-sgfwk\") pod \"csi-node-driver-fg5pv\" (UID: \"259fc121-6a1d-4571-8bc6-9cfbdb3834ad\") " pod="calico-system/csi-node-driver-fg5pv" Oct 29 00:35:44.339092 kubelet[1453]: I1029 00:35:44.339002 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6ftsg\" (UniqueName: \"kubernetes.io/projected/e1f409d9-d354-42e1-b880-b6bae647096f-kube-api-access-6ftsg\") pod \"kube-proxy-nlm6d\" (UID: \"e1f409d9-d354-42e1-b880-b6bae647096f\") " pod="kube-system/kube-proxy-nlm6d" Oct 29 00:35:44.339092 kubelet[1453]: I1029 00:35:44.339017 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-cni-bin-dir\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.339092 kubelet[1453]: I1029 00:35:44.339033 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8cff9994-c439-45f9-86a8-0758f95095eb-tigera-ca-bundle\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.339092 kubelet[1453]: I1029 00:35:44.339066 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8cff9994-c439-45f9-86a8-0758f95095eb-xtables-lock\") pod \"calico-node-29f5v\" (UID: \"8cff9994-c439-45f9-86a8-0758f95095eb\") " pod="calico-system/calico-node-29f5v" Oct 29 00:35:44.440536 kubelet[1453]: I1029 00:35:44.440478 1453 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 29 00:35:44.440698 kubelet[1453]: E1029 00:35:44.440670 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.440732 kubelet[1453]: W1029 00:35:44.440701 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.440732 kubelet[1453]: E1029 00:35:44.440725 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.441003 kubelet[1453]: E1029 00:35:44.440974 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.441003 kubelet[1453]: W1029 00:35:44.440989 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.441089 kubelet[1453]: E1029 00:35:44.441008 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.441239 kubelet[1453]: E1029 00:35:44.441210 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.441239 kubelet[1453]: W1029 00:35:44.441223 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.441296 kubelet[1453]: E1029 00:35:44.441238 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.441548 kubelet[1453]: E1029 00:35:44.441525 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.441548 kubelet[1453]: W1029 00:35:44.441539 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.441605 kubelet[1453]: E1029 00:35:44.441553 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.441763 kubelet[1453]: E1029 00:35:44.441737 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.441763 kubelet[1453]: W1029 00:35:44.441755 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.441826 kubelet[1453]: E1029 00:35:44.441767 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.441934 kubelet[1453]: E1029 00:35:44.441924 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.441977 kubelet[1453]: W1029 00:35:44.441934 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.442006 kubelet[1453]: E1029 00:35:44.441985 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.442148 kubelet[1453]: E1029 00:35:44.442137 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.442148 kubelet[1453]: W1029 00:35:44.442147 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.442211 kubelet[1453]: E1029 00:35:44.442188 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.442301 kubelet[1453]: E1029 00:35:44.442290 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.442337 kubelet[1453]: W1029 00:35:44.442301 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.442379 kubelet[1453]: E1029 00:35:44.442336 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.442448 kubelet[1453]: E1029 00:35:44.442434 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.442448 kubelet[1453]: W1029 00:35:44.442446 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.442493 kubelet[1453]: E1029 00:35:44.442473 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.442612 kubelet[1453]: E1029 00:35:44.442601 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.442612 kubelet[1453]: W1029 00:35:44.442611 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.442654 kubelet[1453]: E1029 00:35:44.442638 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.442766 kubelet[1453]: E1029 00:35:44.442755 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.442792 kubelet[1453]: W1029 00:35:44.442766 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.442829 kubelet[1453]: E1029 00:35:44.442812 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.442928 kubelet[1453]: E1029 00:35:44.442918 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.442952 kubelet[1453]: W1029 00:35:44.442928 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.442952 kubelet[1453]: E1029 00:35:44.442949 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.443131 kubelet[1453]: E1029 00:35:44.443116 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.443164 kubelet[1453]: W1029 00:35:44.443130 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.443164 kubelet[1453]: E1029 00:35:44.443153 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.443358 kubelet[1453]: E1029 00:35:44.443346 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.443383 kubelet[1453]: W1029 00:35:44.443361 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.443405 kubelet[1453]: E1029 00:35:44.443387 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.443547 kubelet[1453]: E1029 00:35:44.443536 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.443578 kubelet[1453]: W1029 00:35:44.443548 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.443630 kubelet[1453]: E1029 00:35:44.443618 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.443770 kubelet[1453]: E1029 00:35:44.443756 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.443793 kubelet[1453]: W1029 00:35:44.443770 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.443873 kubelet[1453]: E1029 00:35:44.443856 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.444108 kubelet[1453]: E1029 00:35:44.444091 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.444108 kubelet[1453]: W1029 00:35:44.444106 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.444334 kubelet[1453]: E1029 00:35:44.444313 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.444430 kubelet[1453]: E1029 00:35:44.444418 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.444477 kubelet[1453]: W1029 00:35:44.444430 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.444652 kubelet[1453]: E1029 00:35:44.444600 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.444760 kubelet[1453]: E1029 00:35:44.444742 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.444783 kubelet[1453]: W1029 00:35:44.444760 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.444967 kubelet[1453]: E1029 00:35:44.444951 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.445418 kubelet[1453]: E1029 00:35:44.445384 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.445418 kubelet[1453]: W1029 00:35:44.445407 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.445527 kubelet[1453]: E1029 00:35:44.445506 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.445692 kubelet[1453]: E1029 00:35:44.445679 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.445716 kubelet[1453]: W1029 00:35:44.445694 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.446578 kubelet[1453]: E1029 00:35:44.446551 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.448455 kubelet[1453]: E1029 00:35:44.448439 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.448455 kubelet[1453]: W1029 00:35:44.448453 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.448595 kubelet[1453]: E1029 00:35:44.448574 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.448652 kubelet[1453]: E1029 00:35:44.448624 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.448706 kubelet[1453]: W1029 00:35:44.448694 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.448854 kubelet[1453]: E1029 00:35:44.448841 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.448975 kubelet[1453]: E1029 00:35:44.448951 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.449043 kubelet[1453]: W1029 00:35:44.449032 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.449165 kubelet[1453]: E1029 00:35:44.449155 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.449390 kubelet[1453]: E1029 00:35:44.449380 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.449455 kubelet[1453]: W1029 00:35:44.449445 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.449562 kubelet[1453]: E1029 00:35:44.449542 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.450100 kubelet[1453]: E1029 00:35:44.450070 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.450178 kubelet[1453]: W1029 00:35:44.450164 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.450325 kubelet[1453]: E1029 00:35:44.450303 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.450608 kubelet[1453]: E1029 00:35:44.450594 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.450680 kubelet[1453]: W1029 00:35:44.450668 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.450793 kubelet[1453]: E1029 00:35:44.450772 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.451031 kubelet[1453]: E1029 00:35:44.451014 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.451102 kubelet[1453]: W1029 00:35:44.451090 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.451247 kubelet[1453]: E1029 00:35:44.451218 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.451382 kubelet[1453]: E1029 00:35:44.451371 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.451441 kubelet[1453]: W1029 00:35:44.451430 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.451625 kubelet[1453]: E1029 00:35:44.451594 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.451817 kubelet[1453]: E1029 00:35:44.451804 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.451893 kubelet[1453]: W1029 00:35:44.451876 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.452021 kubelet[1453]: E1029 00:35:44.451998 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.452251 kubelet[1453]: E1029 00:35:44.452236 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.452317 kubelet[1453]: W1029 00:35:44.452307 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.452470 kubelet[1453]: E1029 00:35:44.452451 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.452588 kubelet[1453]: E1029 00:35:44.452576 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.452661 kubelet[1453]: W1029 00:35:44.452648 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.452878 kubelet[1453]: E1029 00:35:44.452867 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.452953 kubelet[1453]: W1029 00:35:44.452941 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.453138 kubelet[1453]: E1029 00:35:44.453127 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.453218 kubelet[1453]: E1029 00:35:44.453186 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.453253 kubelet[1453]: W1029 00:35:44.453189 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.453304 kubelet[1453]: E1029 00:35:44.453289 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.453384 kubelet[1453]: E1029 00:35:44.453371 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.453631 kubelet[1453]: E1029 00:35:44.453602 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.453631 kubelet[1453]: W1029 00:35:44.453620 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.455195 kubelet[1453]: E1029 00:35:44.455162 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.455302 kubelet[1453]: E1029 00:35:44.455200 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.455368 kubelet[1453]: W1029 00:35:44.455355 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.455586 kubelet[1453]: E1029 00:35:44.455571 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.456976 kubelet[1453]: E1029 00:35:44.456959 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.457061 kubelet[1453]: W1029 00:35:44.457049 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.457246 kubelet[1453]: E1029 00:35:44.457232 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.457402 kubelet[1453]: E1029 00:35:44.457391 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.457465 kubelet[1453]: W1029 00:35:44.457455 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.457651 kubelet[1453]: E1029 00:35:44.457640 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.457801 kubelet[1453]: E1029 00:35:44.457790 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.457872 kubelet[1453]: W1029 00:35:44.457859 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.458075 kubelet[1453]: E1029 00:35:44.458061 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.458219 kubelet[1453]: E1029 00:35:44.458209 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.458282 kubelet[1453]: W1029 00:35:44.458271 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.458454 kubelet[1453]: E1029 00:35:44.458442 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.458801 kubelet[1453]: E1029 00:35:44.458786 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.458892 kubelet[1453]: W1029 00:35:44.458880 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.459070 kubelet[1453]: E1029 00:35:44.459056 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.459221 kubelet[1453]: E1029 00:35:44.459204 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.459288 kubelet[1453]: W1029 00:35:44.459277 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.459365 kubelet[1453]: E1029 00:35:44.459353 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.460681 kubelet[1453]: E1029 00:35:44.460656 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.460765 kubelet[1453]: W1029 00:35:44.460672 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.460765 kubelet[1453]: E1029 00:35:44.460704 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.461998 kubelet[1453]: E1029 00:35:44.461980 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.461998 kubelet[1453]: W1029 00:35:44.461997 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.462086 kubelet[1453]: E1029 00:35:44.462011 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.474057 kubelet[1453]: E1029 00:35:44.474029 1453 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 00:35:44.474057 kubelet[1453]: W1029 00:35:44.474053 1453 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 00:35:44.474325 kubelet[1453]: E1029 00:35:44.474078 1453 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 00:35:44.626494 kubelet[1453]: E1029 00:35:44.624334 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:44.626785 env[1217]: time="2025-10-29T00:35:44.625630119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-29f5v,Uid:8cff9994-c439-45f9-86a8-0758f95095eb,Namespace:calico-system,Attempt:0,}" Oct 29 00:35:44.629643 kubelet[1453]: E1029 00:35:44.629616 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:44.630021 env[1217]: time="2025-10-29T00:35:44.629975855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nlm6d,Uid:e1f409d9-d354-42e1-b880-b6bae647096f,Namespace:kube-system,Attempt:0,}" Oct 29 00:35:45.186258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2918548334.mount: Deactivated successfully. Oct 29 00:35:45.202192 env[1217]: time="2025-10-29T00:35:45.202136526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.205217 env[1217]: time="2025-10-29T00:35:45.205184339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.207709 env[1217]: time="2025-10-29T00:35:45.207672294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.210612 env[1217]: time="2025-10-29T00:35:45.210579460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.213386 env[1217]: time="2025-10-29T00:35:45.213328936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.214308 env[1217]: time="2025-10-29T00:35:45.214279589Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.216206 env[1217]: time="2025-10-29T00:35:45.216182996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.220997 env[1217]: time="2025-10-29T00:35:45.220959209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:45.246131 env[1217]: time="2025-10-29T00:35:45.246039251Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 00:35:45.246131 env[1217]: time="2025-10-29T00:35:45.246096873Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 00:35:45.246131 env[1217]: time="2025-10-29T00:35:45.246110586Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 00:35:45.246339 env[1217]: time="2025-10-29T00:35:45.246304061Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900 pid=1563 runtime=io.containerd.runc.v2 Oct 29 00:35:45.246649 env[1217]: time="2025-10-29T00:35:45.246582028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 00:35:45.246649 env[1217]: time="2025-10-29T00:35:45.246618766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 00:35:45.246649 env[1217]: time="2025-10-29T00:35:45.246629387Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 00:35:45.246763 env[1217]: time="2025-10-29T00:35:45.246731514Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ce18d653dd5665bddcf78f2a24dc6519ae683ce234dd2842009631a124cddcd pid=1562 runtime=io.containerd.runc.v2 Oct 29 00:35:45.262537 systemd[1]: Started cri-containerd-c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900.scope. Oct 29 00:35:45.264775 systemd[1]: Started cri-containerd-7ce18d653dd5665bddcf78f2a24dc6519ae683ce234dd2842009631a124cddcd.scope. Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit: BPF prog-id=58 op=LOAD Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1563 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336336363653137346335613636613334663130393233353838653932 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1563 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336336363653137346335613636613334663130393233353838653932 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit: BPF prog-id=59 op=LOAD Oct 29 00:35:45.283000 audit[1582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1563 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336336363653137346335613636613334663130393233353838653932 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit: BPF prog-id=60 op=LOAD Oct 29 00:35:45.283000 audit[1582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1563 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336336363653137346335613636613334663130393233353838653932 Oct 29 00:35:45.283000 audit: BPF prog-id=60 op=UNLOAD Oct 29 00:35:45.283000 audit: BPF prog-id=59 op=UNLOAD Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.283000 audit: BPF prog-id=61 op=LOAD Oct 29 00:35:45.283000 audit[1582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1563 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336336363653137346335613636613334663130393233353838653932 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.287000 audit: BPF prog-id=62 op=LOAD Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1562 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653138643635336464353636356264646366373866326132346463 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1562 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653138643635336464353636356264646366373866326132346463 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit: BPF prog-id=63 op=LOAD Oct 29 00:35:45.289000 audit[1581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1562 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653138643635336464353636356264646366373866326132346463 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.289000 audit: BPF prog-id=64 op=LOAD Oct 29 00:35:45.289000 audit[1581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1562 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653138643635336464353636356264646366373866326132346463 Oct 29 00:35:45.290000 audit: BPF prog-id=64 op=UNLOAD Oct 29 00:35:45.290000 audit: BPF prog-id=63 op=UNLOAD Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:45.290000 audit: BPF prog-id=65 op=LOAD Oct 29 00:35:45.290000 audit[1581]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1562 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:45.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763653138643635336464353636356264646366373866326132346463 Oct 29 00:35:45.293484 kubelet[1453]: E1029 00:35:45.293428 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:45.303447 env[1217]: time="2025-10-29T00:35:45.303401204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-29f5v,Uid:8cff9994-c439-45f9-86a8-0758f95095eb,Namespace:calico-system,Attempt:0,} returns sandbox id \"c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900\"" Oct 29 00:35:45.303617 env[1217]: time="2025-10-29T00:35:45.303594957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nlm6d,Uid:e1f409d9-d354-42e1-b880-b6bae647096f,Namespace:kube-system,Attempt:0,} returns sandbox id \"7ce18d653dd5665bddcf78f2a24dc6519ae683ce234dd2842009631a124cddcd\"" Oct 29 00:35:45.304599 kubelet[1453]: E1029 00:35:45.304569 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:45.305406 kubelet[1453]: E1029 00:35:45.305245 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:45.306806 env[1217]: time="2025-10-29T00:35:45.306773313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 29 00:35:45.427612 kubelet[1453]: E1029 00:35:45.427520 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:35:46.256338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1376603628.mount: Deactivated successfully. Oct 29 00:35:46.294747 kubelet[1453]: E1029 00:35:46.294697 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:46.352269 env[1217]: time="2025-10-29T00:35:46.352187286Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:46.354753 env[1217]: time="2025-10-29T00:35:46.354710002Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:46.356962 env[1217]: time="2025-10-29T00:35:46.356881104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:46.358202 env[1217]: time="2025-10-29T00:35:46.358163927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:46.358598 env[1217]: time="2025-10-29T00:35:46.358549425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640\"" Oct 29 00:35:46.361237 env[1217]: time="2025-10-29T00:35:46.361175657Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Oct 29 00:35:46.361447 env[1217]: time="2025-10-29T00:35:46.361400504Z" level=info msg="CreateContainer within sandbox \"c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 29 00:35:46.376709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2905430336.mount: Deactivated successfully. Oct 29 00:35:46.384720 env[1217]: time="2025-10-29T00:35:46.384566784Z" level=info msg="CreateContainer within sandbox \"c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671\"" Oct 29 00:35:46.386151 env[1217]: time="2025-10-29T00:35:46.385286676Z" level=info msg="StartContainer for \"6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671\"" Oct 29 00:35:46.406161 systemd[1]: Started cri-containerd-6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671.scope. Oct 29 00:35:46.431648 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 29 00:35:46.431769 kernel: audit: type=1400 audit(1761698146.428:462): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1563 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:46.437348 kernel: audit: type=1300 audit(1761698146.428:462): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1563 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:46.437472 kernel: audit: type=1327 audit(1761698146.428:462): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363136663538623031613037383839376464313933303634613631 Oct 29 00:35:46.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363136663538623031613037383839376464313933303634613631 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.445583 kernel: audit: type=1400 audit(1761698146.428:463): avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.445641 kernel: audit: type=1400 audit(1761698146.428:463): avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.449709 kernel: audit: type=1400 audit(1761698146.428:463): avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.454729 kernel: audit: type=1400 audit(1761698146.428:463): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.454824 kernel: audit: type=1400 audit(1761698146.428:463): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.462266 kernel: audit: type=1400 audit(1761698146.428:463): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.462486 kernel: audit: type=1400 audit(1761698146.428:463): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.428000 audit: BPF prog-id=66 op=LOAD Oct 29 00:35:46.428000 audit[1637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1563 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:46.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363136663538623031613037383839376464313933303634613631 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.431000 audit: BPF prog-id=67 op=LOAD Oct 29 00:35:46.431000 audit[1637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1563 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:46.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363136663538623031613037383839376464313933303634613631 Oct 29 00:35:46.433000 audit: BPF prog-id=67 op=UNLOAD Oct 29 00:35:46.433000 audit: BPF prog-id=66 op=UNLOAD Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:46.433000 audit: BPF prog-id=68 op=LOAD Oct 29 00:35:46.433000 audit[1637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1563 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:46.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665363136663538623031613037383839376464313933303634613631 Oct 29 00:35:46.465996 env[1217]: time="2025-10-29T00:35:46.465727800Z" level=info msg="StartContainer for \"6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671\" returns successfully" Oct 29 00:35:46.480899 systemd[1]: cri-containerd-6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671.scope: Deactivated successfully. Oct 29 00:35:46.486000 audit: BPF prog-id=68 op=UNLOAD Oct 29 00:35:46.498987 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671-rootfs.mount: Deactivated successfully. Oct 29 00:35:46.530348 env[1217]: time="2025-10-29T00:35:46.530086024Z" level=info msg="shim disconnected" id=6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671 Oct 29 00:35:46.530348 env[1217]: time="2025-10-29T00:35:46.530130461Z" level=warning msg="cleaning up after shim disconnected" id=6e616f58b01a078897dd193064a61162c67ed83420ad4c97bbca04c925c7d671 namespace=k8s.io Oct 29 00:35:46.530348 env[1217]: time="2025-10-29T00:35:46.530140738Z" level=info msg="cleaning up dead shim" Oct 29 00:35:46.539797 env[1217]: time="2025-10-29T00:35:46.539759966Z" level=warning msg="cleanup warnings time=\"2025-10-29T00:35:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1677 runtime=io.containerd.runc.v2\n" Oct 29 00:35:47.295356 kubelet[1453]: E1029 00:35:47.295304 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:47.429001 kubelet[1453]: E1029 00:35:47.428497 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:35:47.442316 kubelet[1453]: E1029 00:35:47.441841 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:47.511126 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2120540464.mount: Deactivated successfully. Oct 29 00:35:47.995727 env[1217]: time="2025-10-29T00:35:47.995653897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:47.997576 env[1217]: time="2025-10-29T00:35:47.997540494Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:47.999206 env[1217]: time="2025-10-29T00:35:47.999173340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:48.001161 env[1217]: time="2025-10-29T00:35:48.001123683Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:48.001630 env[1217]: time="2025-10-29T00:35:48.001598614Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4\"" Oct 29 00:35:48.003193 env[1217]: time="2025-10-29T00:35:48.003158378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 29 00:35:48.004090 env[1217]: time="2025-10-29T00:35:48.004018460Z" level=info msg="CreateContainer within sandbox \"7ce18d653dd5665bddcf78f2a24dc6519ae683ce234dd2842009631a124cddcd\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 29 00:35:48.022641 env[1217]: time="2025-10-29T00:35:48.022579243Z" level=info msg="CreateContainer within sandbox \"7ce18d653dd5665bddcf78f2a24dc6519ae683ce234dd2842009631a124cddcd\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cc9c0d611ae267444b26e3f3d42f1eda036398c2145d51534144ef7ff9e26099\"" Oct 29 00:35:48.023494 env[1217]: time="2025-10-29T00:35:48.023468743Z" level=info msg="StartContainer for \"cc9c0d611ae267444b26e3f3d42f1eda036398c2145d51534144ef7ff9e26099\"" Oct 29 00:35:48.042840 systemd[1]: Started cri-containerd-cc9c0d611ae267444b26e3f3d42f1eda036398c2145d51534144ef7ff9e26099.scope. Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1562 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396330643631316165323637343434623236653366336434326631 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit: BPF prog-id=69 op=LOAD Oct 29 00:35:48.065000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1562 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396330643631316165323637343434623236653366336434326631 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit: BPF prog-id=70 op=LOAD Oct 29 00:35:48.065000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1562 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396330643631316165323637343434623236653366336434326631 Oct 29 00:35:48.065000 audit: BPF prog-id=70 op=UNLOAD Oct 29 00:35:48.065000 audit: BPF prog-id=69 op=UNLOAD Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:48.065000 audit: BPF prog-id=71 op=LOAD Oct 29 00:35:48.065000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1562 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396330643631316165323637343434623236653366336434326631 Oct 29 00:35:48.081454 env[1217]: time="2025-10-29T00:35:48.081401753Z" level=info msg="StartContainer for \"cc9c0d611ae267444b26e3f3d42f1eda036398c2145d51534144ef7ff9e26099\" returns successfully" Oct 29 00:35:48.254000 audit[1764]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.254000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc23f2cb0 a2=0 a3=1 items=0 ppid=1714 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 00:35:48.255000 audit[1765]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.255000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffda237c0 a2=0 a3=1 items=0 ppid=1714 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 00:35:48.256000 audit[1768]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.256000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc66ed970 a2=0 a3=1 items=0 ppid=1714 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 00:35:48.257000 audit[1769]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.257000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff0a9cc80 a2=0 a3=1 items=0 ppid=1714 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 00:35:48.258000 audit[1767]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.258000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8f7b080 a2=0 a3=1 items=0 ppid=1714 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 00:35:48.259000 audit[1770]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.259000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd6962b0 a2=0 a3=1 items=0 ppid=1714 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 00:35:48.295912 kubelet[1453]: E1029 00:35:48.295848 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:48.356000 audit[1771]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.356000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffefa69470 a2=0 a3=1 items=0 ppid=1714 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 00:35:48.359000 audit[1773]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.359000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd34a4bf0 a2=0 a3=1 items=0 ppid=1714 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 29 00:35:48.362000 audit[1776]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.362000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff02e2380 a2=0 a3=1 items=0 ppid=1714 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 29 00:35:48.363000 audit[1777]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.363000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7a4dfa0 a2=0 a3=1 items=0 ppid=1714 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 00:35:48.365000 audit[1779]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.365000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd74397d0 a2=0 a3=1 items=0 ppid=1714 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 00:35:48.366000 audit[1780]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.366000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe02e78e0 a2=0 a3=1 items=0 ppid=1714 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 00:35:48.369000 audit[1782]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.369000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd7cde940 a2=0 a3=1 items=0 ppid=1714 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 00:35:48.372000 audit[1785]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.372000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe0d19040 a2=0 a3=1 items=0 ppid=1714 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 29 00:35:48.373000 audit[1786]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.373000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedfde780 a2=0 a3=1 items=0 ppid=1714 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 00:35:48.375000 audit[1788]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.375000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe68f0d50 a2=0 a3=1 items=0 ppid=1714 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 00:35:48.376000 audit[1789]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.376000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd08fc270 a2=0 a3=1 items=0 ppid=1714 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 00:35:48.379000 audit[1791]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.379000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc96630f0 a2=0 a3=1 items=0 ppid=1714 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 00:35:48.382000 audit[1794]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.382000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe13f91e0 a2=0 a3=1 items=0 ppid=1714 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 00:35:48.385000 audit[1797]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.385000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffa8f1ec0 a2=0 a3=1 items=0 ppid=1714 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 00:35:48.386000 audit[1798]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.386000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeb761590 a2=0 a3=1 items=0 ppid=1714 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 00:35:48.389000 audit[1800]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.389000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc9f2a2d0 a2=0 a3=1 items=0 ppid=1714 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 00:35:48.410000 audit[1804]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.410000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd1a0d880 a2=0 a3=1 items=0 ppid=1714 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 00:35:48.411000 audit[1805]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.411000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb2ecab0 a2=0 a3=1 items=0 ppid=1714 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 00:35:48.414000 audit[1807]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 00:35:48.414000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffebeed9a0 a2=0 a3=1 items=0 ppid=1714 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 00:35:48.438000 audit[1813]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:35:48.438000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffffdd7c10 a2=0 a3=1 items=0 ppid=1714 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:35:48.444210 kubelet[1453]: E1029 00:35:48.444094 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:48.460399 kubelet[1453]: I1029 00:35:48.460321 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-nlm6d" podStartSLOduration=2.7636675630000003 podStartE2EDuration="5.460304571s" podCreationTimestamp="2025-10-29 00:35:43 +0000 UTC" firstStartedPulling="2025-10-29 00:35:45.305996042 +0000 UTC m=+2.861871703" lastFinishedPulling="2025-10-29 00:35:48.00263301 +0000 UTC m=+5.558508711" observedRunningTime="2025-10-29 00:35:48.460203998 +0000 UTC m=+6.016079699" watchObservedRunningTime="2025-10-29 00:35:48.460304571 +0000 UTC m=+6.016180232" Oct 29 00:35:48.468000 audit[1813]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:35:48.468000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25476 a0=3 a1=ffffffdd7c10 a2=0 a3=1 items=0 ppid=1714 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:35:48.476000 audit[1822]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.476000 audit[1822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd925cc80 a2=0 a3=1 items=0 ppid=1714 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 00:35:48.482000 audit[1824]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.482000 audit[1824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc32822a0 a2=0 a3=1 items=0 ppid=1714 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 29 00:35:48.486000 audit[1827]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.486000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd9553e70 a2=0 a3=1 items=0 ppid=1714 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 29 00:35:48.487000 audit[1828]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.487000 audit[1828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5610860 a2=0 a3=1 items=0 ppid=1714 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 00:35:48.490000 audit[1830]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.490000 audit[1830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa6f9840 a2=0 a3=1 items=0 ppid=1714 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 00:35:48.490000 audit[1831]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.490000 audit[1831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd648a500 a2=0 a3=1 items=0 ppid=1714 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 00:35:48.492000 audit[1833]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.492000 audit[1833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff1604910 a2=0 a3=1 items=0 ppid=1714 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 29 00:35:48.496000 audit[1836]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.496000 audit[1836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd8e23d80 a2=0 a3=1 items=0 ppid=1714 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 00:35:48.497000 audit[1837]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.497000 audit[1837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd84d710 a2=0 a3=1 items=0 ppid=1714 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 00:35:48.499000 audit[1839]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.499000 audit[1839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc900f060 a2=0 a3=1 items=0 ppid=1714 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 00:35:48.500000 audit[1840]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.500000 audit[1840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff887c0e0 a2=0 a3=1 items=0 ppid=1714 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 00:35:48.502000 audit[1842]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.502000 audit[1842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe4d70970 a2=0 a3=1 items=0 ppid=1714 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 00:35:48.506000 audit[1845]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.506000 audit[1845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff91e2b90 a2=0 a3=1 items=0 ppid=1714 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 00:35:48.512000 audit[1848]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.512000 audit[1848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc9d26150 a2=0 a3=1 items=0 ppid=1714 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 29 00:35:48.513000 audit[1849]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.513000 audit[1849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffa1de4c0 a2=0 a3=1 items=0 ppid=1714 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 00:35:48.515000 audit[1851]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.515000 audit[1851]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd8df95f0 a2=0 a3=1 items=0 ppid=1714 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 00:35:48.518000 audit[1854]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.518000 audit[1854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe881af30 a2=0 a3=1 items=0 ppid=1714 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 00:35:48.520000 audit[1855]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.520000 audit[1855]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd93528f0 a2=0 a3=1 items=0 ppid=1714 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 00:35:48.522000 audit[1857]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.522000 audit[1857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff590c6e0 a2=0 a3=1 items=0 ppid=1714 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 00:35:48.523000 audit[1858]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.523000 audit[1858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf6ca080 a2=0 a3=1 items=0 ppid=1714 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 00:35:48.525000 audit[1860]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.525000 audit[1860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeebcc4e0 a2=0 a3=1 items=0 ppid=1714 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 00:35:48.528000 audit[1863]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 00:35:48.528000 audit[1863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd881b2b0 a2=0 a3=1 items=0 ppid=1714 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 00:35:48.531000 audit[1865]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 00:35:48.531000 audit[1865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe7213780 a2=0 a3=1 items=0 ppid=1714 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.531000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:35:48.532000 audit[1865]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 00:35:48.532000 audit[1865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe7213780 a2=0 a3=1 items=0 ppid=1714 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:48.532000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:35:49.296211 kubelet[1453]: E1029 00:35:49.295946 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:49.428692 kubelet[1453]: E1029 00:35:49.428394 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:35:49.445988 kubelet[1453]: E1029 00:35:49.445846 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:50.296407 kubelet[1453]: E1029 00:35:50.296359 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:50.356790 env[1217]: time="2025-10-29T00:35:50.356713846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:50.361695 env[1217]: time="2025-10-29T00:35:50.361625297Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:50.363610 env[1217]: time="2025-10-29T00:35:50.363578794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:50.365966 env[1217]: time="2025-10-29T00:35:50.365938198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:50.366941 env[1217]: time="2025-10-29T00:35:50.366215318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2\"" Oct 29 00:35:50.370009 env[1217]: time="2025-10-29T00:35:50.369979592Z" level=info msg="CreateContainer within sandbox \"c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 29 00:35:50.391650 env[1217]: time="2025-10-29T00:35:50.391606042Z" level=info msg="CreateContainer within sandbox \"c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72\"" Oct 29 00:35:50.392255 env[1217]: time="2025-10-29T00:35:50.392227284Z" level=info msg="StartContainer for \"241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72\"" Oct 29 00:35:50.417079 systemd[1]: run-containerd-runc-k8s.io-241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72-runc.8BpjcX.mount: Deactivated successfully. Oct 29 00:35:50.418485 systemd[1]: Started cri-containerd-241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72.scope. Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1563 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:50.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316337383333336632393064613237303335333865396664313161 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit: BPF prog-id=72 op=LOAD Oct 29 00:35:50.431000 audit[1874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1563 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:50.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316337383333336632393064613237303335333865396664313161 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit: BPF prog-id=73 op=LOAD Oct 29 00:35:50.431000 audit[1874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1563 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:50.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316337383333336632393064613237303335333865396664313161 Oct 29 00:35:50.431000 audit: BPF prog-id=73 op=UNLOAD Oct 29 00:35:50.431000 audit: BPF prog-id=72 op=UNLOAD Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:50.431000 audit: BPF prog-id=74 op=LOAD Oct 29 00:35:50.431000 audit[1874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1563 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:50.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316337383333336632393064613237303335333865396664313161 Oct 29 00:35:50.445060 env[1217]: time="2025-10-29T00:35:50.445015337Z" level=info msg="StartContainer for \"241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72\" returns successfully" Oct 29 00:35:50.448862 kubelet[1453]: E1029 00:35:50.448574 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:51.297460 kubelet[1453]: E1029 00:35:51.297413 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:51.300124 env[1217]: time="2025-10-29T00:35:51.299613798Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 00:35:51.301907 systemd[1]: cri-containerd-241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72.scope: Deactivated successfully. Oct 29 00:35:51.308000 audit: BPF prog-id=74 op=UNLOAD Oct 29 00:35:51.363242 kubelet[1453]: I1029 00:35:51.363185 1453 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 29 00:35:51.385130 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72-rootfs.mount: Deactivated successfully. Oct 29 00:35:51.433864 systemd[1]: Created slice kubepods-besteffort-pod259fc121_6a1d_4571_8bc6_9cfbdb3834ad.slice. Oct 29 00:35:51.437245 env[1217]: time="2025-10-29T00:35:51.437205605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fg5pv,Uid:259fc121-6a1d-4571-8bc6-9cfbdb3834ad,Namespace:calico-system,Attempt:0,}" Oct 29 00:35:51.450310 kubelet[1453]: E1029 00:35:51.450279 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:51.470454 env[1217]: time="2025-10-29T00:35:51.470407537Z" level=info msg="shim disconnected" id=241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72 Oct 29 00:35:51.470454 env[1217]: time="2025-10-29T00:35:51.470452191Z" level=warning msg="cleaning up after shim disconnected" id=241c78333f290da2703538e9fd11accfe0793c51121231cfc938b7a2baf20e72 namespace=k8s.io Oct 29 00:35:51.470454 env[1217]: time="2025-10-29T00:35:51.470460556Z" level=info msg="cleaning up dead shim" Oct 29 00:35:51.478007 env[1217]: time="2025-10-29T00:35:51.477955504Z" level=warning msg="cleanup warnings time=\"2025-10-29T00:35:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1915 runtime=io.containerd.runc.v2\n" Oct 29 00:35:51.546779 env[1217]: time="2025-10-29T00:35:51.546712729Z" level=error msg="Failed to destroy network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:51.548149 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5-shm.mount: Deactivated successfully. Oct 29 00:35:51.549160 env[1217]: time="2025-10-29T00:35:51.549102098Z" level=error msg="encountered an error cleaning up failed sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:51.549236 env[1217]: time="2025-10-29T00:35:51.549169498Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fg5pv,Uid:259fc121-6a1d-4571-8bc6-9cfbdb3834ad,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:51.549868 kubelet[1453]: E1029 00:35:51.549425 1453 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:51.549868 kubelet[1453]: E1029 00:35:51.549506 1453 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fg5pv" Oct 29 00:35:51.549868 kubelet[1453]: E1029 00:35:51.549541 1453 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fg5pv" Oct 29 00:35:51.550032 kubelet[1453]: E1029 00:35:51.549582 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fg5pv_calico-system(259fc121-6a1d-4571-8bc6-9cfbdb3834ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fg5pv_calico-system(259fc121-6a1d-4571-8bc6-9cfbdb3834ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:35:52.297612 kubelet[1453]: E1029 00:35:52.297568 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:52.453274 kubelet[1453]: E1029 00:35:52.453102 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:52.455603 kubelet[1453]: I1029 00:35:52.454290 1453 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Oct 29 00:35:52.455750 env[1217]: time="2025-10-29T00:35:52.454359381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 29 00:35:52.455969 env[1217]: time="2025-10-29T00:35:52.455761116Z" level=info msg="StopPodSandbox for \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\"" Oct 29 00:35:52.484456 env[1217]: time="2025-10-29T00:35:52.484386463Z" level=error msg="StopPodSandbox for \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\" failed" error="failed to destroy network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:52.484707 kubelet[1453]: E1029 00:35:52.484670 1453 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Oct 29 00:35:52.484786 kubelet[1453]: E1029 00:35:52.484738 1453 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5"} Oct 29 00:35:52.484824 kubelet[1453]: E1029 00:35:52.484805 1453 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"259fc121-6a1d-4571-8bc6-9cfbdb3834ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 00:35:52.484888 kubelet[1453]: E1029 00:35:52.484827 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"259fc121-6a1d-4571-8bc6-9cfbdb3834ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:35:53.298718 kubelet[1453]: E1029 00:35:53.298636 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:54.299156 kubelet[1453]: E1029 00:35:54.299078 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:54.911822 systemd[1]: Created slice kubepods-besteffort-pod6f0ce5db_2d9a_48f5_b198_c1be1c7a95c8.slice. Oct 29 00:35:55.014142 kubelet[1453]: I1029 00:35:55.014098 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ns5lt\" (UniqueName: \"kubernetes.io/projected/6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8-kube-api-access-ns5lt\") pod \"nginx-deployment-7fcdb87857-bgp8h\" (UID: \"6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8\") " pod="default/nginx-deployment-7fcdb87857-bgp8h" Oct 29 00:35:55.215039 env[1217]: time="2025-10-29T00:35:55.214902165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bgp8h,Uid:6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8,Namespace:default,Attempt:0,}" Oct 29 00:35:55.276576 env[1217]: time="2025-10-29T00:35:55.276501731Z" level=error msg="Failed to destroy network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:55.278234 env[1217]: time="2025-10-29T00:35:55.276883601Z" level=error msg="encountered an error cleaning up failed sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:55.278234 env[1217]: time="2025-10-29T00:35:55.276930247Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bgp8h,Uid:6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:55.278104 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51-shm.mount: Deactivated successfully. Oct 29 00:35:55.279204 kubelet[1453]: E1029 00:35:55.278807 1453 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:55.279204 kubelet[1453]: E1029 00:35:55.278878 1453 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-bgp8h" Oct 29 00:35:55.279204 kubelet[1453]: E1029 00:35:55.278897 1453 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-bgp8h" Oct 29 00:35:55.279351 kubelet[1453]: E1029 00:35:55.278935 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-bgp8h_default(6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-bgp8h_default(6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-bgp8h" podUID="6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8" Oct 29 00:35:55.299931 kubelet[1453]: E1029 00:35:55.299886 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:55.459716 kubelet[1453]: I1029 00:35:55.459685 1453 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Oct 29 00:35:55.460189 env[1217]: time="2025-10-29T00:35:55.460155621Z" level=info msg="StopPodSandbox for \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\"" Oct 29 00:35:55.481750 env[1217]: time="2025-10-29T00:35:55.481607944Z" level=error msg="StopPodSandbox for \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\" failed" error="failed to destroy network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 00:35:55.481917 kubelet[1453]: E1029 00:35:55.481876 1453 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Oct 29 00:35:55.481965 kubelet[1453]: E1029 00:35:55.481933 1453 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51"} Oct 29 00:35:55.482006 kubelet[1453]: E1029 00:35:55.481968 1453 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 00:35:55.482006 kubelet[1453]: E1029 00:35:55.481988 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-bgp8h" podUID="6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8" Oct 29 00:35:56.300411 kubelet[1453]: E1029 00:35:56.300364 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:57.214333 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount762909265.mount: Deactivated successfully. Oct 29 00:35:57.300502 kubelet[1453]: E1029 00:35:57.300454 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:57.462861 env[1217]: time="2025-10-29T00:35:57.462822234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:57.464681 env[1217]: time="2025-10-29T00:35:57.464444848Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:57.468369 env[1217]: time="2025-10-29T00:35:57.468335074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:57.470431 env[1217]: time="2025-10-29T00:35:57.470385171Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:35:57.470684 env[1217]: time="2025-10-29T00:35:57.470647522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b\"" Oct 29 00:35:57.482569 env[1217]: time="2025-10-29T00:35:57.482491756Z" level=info msg="CreateContainer within sandbox \"c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 29 00:35:57.497504 env[1217]: time="2025-10-29T00:35:57.497437527Z" level=info msg="CreateContainer within sandbox \"c63cce174c5a66a34f10923588e9279a9997baf18d1e9c293e26051263826900\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4b999a8243fa59286b082644d7f47e3de4fd595db2299dcf92489d96e1f066cf\"" Oct 29 00:35:57.497974 env[1217]: time="2025-10-29T00:35:57.497942385Z" level=info msg="StartContainer for \"4b999a8243fa59286b082644d7f47e3de4fd595db2299dcf92489d96e1f066cf\"" Oct 29 00:35:57.512614 systemd[1]: Started cri-containerd-4b999a8243fa59286b082644d7f47e3de4fd595db2299dcf92489d96e1f066cf.scope. Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.537910 kernel: kauditd_printk_skb: 274 callbacks suppressed Oct 29 00:35:57.538010 kernel: audit: type=1400 audit(1761698157.532:533): avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.538035 kernel: audit: type=1300 audit(1761698157.532:533): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1563 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:57.532000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1563 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:57.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393939613832343366613539323836623038323634346437663437 Oct 29 00:35:57.544847 kernel: audit: type=1327 audit(1761698157.532:533): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393939613832343366613539323836623038323634346437663437 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.547624 kernel: audit: type=1400 audit(1761698157.532:534): avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.547706 kernel: audit: type=1400 audit(1761698157.532:534): avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.552352 kernel: audit: type=1400 audit(1761698157.532:534): avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.552431 kernel: audit: type=1400 audit(1761698157.532:534): avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.558506 kernel: audit: type=1400 audit(1761698157.532:534): avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.560197 kernel: audit: type=1400 audit(1761698157.532:534): avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.560236 kernel: audit: type=1400 audit(1761698157.532:534): avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit: BPF prog-id=75 op=LOAD Oct 29 00:35:57.532000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1563 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:57.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393939613832343366613539323836623038323634346437663437 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.532000 audit: BPF prog-id=76 op=LOAD Oct 29 00:35:57.532000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1563 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:57.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393939613832343366613539323836623038323634346437663437 Oct 29 00:35:57.532000 audit: BPF prog-id=76 op=UNLOAD Oct 29 00:35:57.532000 audit: BPF prog-id=75 op=UNLOAD Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:57.533000 audit: BPF prog-id=77 op=LOAD Oct 29 00:35:57.533000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1563 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:57.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393939613832343366613539323836623038323634346437663437 Oct 29 00:35:57.563453 env[1217]: time="2025-10-29T00:35:57.562993484Z" level=info msg="StartContainer for \"4b999a8243fa59286b082644d7f47e3de4fd595db2299dcf92489d96e1f066cf\" returns successfully" Oct 29 00:35:57.680108 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 29 00:35:57.680230 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 29 00:35:58.301420 kubelet[1453]: E1029 00:35:58.301368 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:58.465811 kubelet[1453]: E1029 00:35:58.465761 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:35:58.481989 kubelet[1453]: I1029 00:35:58.481925 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-29f5v" podStartSLOduration=3.316219004 podStartE2EDuration="15.481900441s" podCreationTimestamp="2025-10-29 00:35:43 +0000 UTC" firstStartedPulling="2025-10-29 00:35:45.305942065 +0000 UTC m=+2.861817766" lastFinishedPulling="2025-10-29 00:35:57.471623542 +0000 UTC m=+15.027499203" observedRunningTime="2025-10-29 00:35:58.481465072 +0000 UTC m=+16.037340772" watchObservedRunningTime="2025-10-29 00:35:58.481900441 +0000 UTC m=+16.037776102" Oct 29 00:35:58.914000 audit[2143]: AVC avc: denied { write } for pid=2143 comm="tee" name="fd" dev="proc" ino=13719 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 00:35:58.914000 audit[2143]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff40557f1 a2=241 a3=1b6 items=1 ppid=2108 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:58.914000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 29 00:35:58.914000 audit: PATH item=0 name="/dev/fd/63" inode=13716 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:58.914000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 00:35:58.918000 audit[2149]: AVC avc: denied { write } for pid=2149 comm="tee" name="fd" dev="proc" ino=13726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 00:35:58.918000 audit[2149]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff55b87f2 a2=241 a3=1b6 items=1 ppid=2113 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:58.918000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 29 00:35:58.918000 audit: PATH item=0 name="/dev/fd/63" inode=13723 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:58.918000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 00:35:58.924000 audit[2169]: AVC avc: denied { write } for pid=2169 comm="tee" name="fd" dev="proc" ino=13734 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 00:35:58.924000 audit[2169]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda48b7e2 a2=241 a3=1b6 items=1 ppid=2119 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:58.924000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 29 00:35:58.924000 audit: PATH item=0 name="/dev/fd/63" inode=15634 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:58.924000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 00:35:58.928000 audit[2165]: AVC avc: denied { write } for pid=2165 comm="tee" name="fd" dev="proc" ino=13742 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 00:35:58.928000 audit[2165]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc2f227f1 a2=241 a3=1b6 items=1 ppid=2115 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:58.928000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 29 00:35:58.928000 audit: PATH item=0 name="/dev/fd/63" inode=16393 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:58.928000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 00:35:58.933000 audit[2176]: AVC avc: denied { write } for pid=2176 comm="tee" name="fd" dev="proc" ino=13746 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 00:35:58.933000 audit[2176]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda10b7f1 a2=241 a3=1b6 items=1 ppid=2106 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:58.933000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 29 00:35:58.933000 audit: PATH item=0 name="/dev/fd/63" inode=14691 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:58.933000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 00:35:58.939000 audit[2183]: AVC avc: denied { write } for pid=2183 comm="tee" name="fd" dev="proc" ino=16396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 00:35:58.939000 audit[2183]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffde49c7f3 a2=241 a3=1b6 items=1 ppid=2114 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:58.939000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 29 00:35:58.939000 audit: PATH item=0 name="/dev/fd/63" inode=14694 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:58.939000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 00:35:58.941000 audit[2173]: AVC avc: denied { write } for pid=2173 comm="tee" name="fd" dev="proc" ino=16400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 00:35:58.941000 audit[2173]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4a1e7e1 a2=241 a3=1b6 items=1 ppid=2111 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:58.941000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 29 00:35:58.941000 audit: PATH item=0 name="/dev/fd/63" inode=15636 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:35:58.941000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit: BPF prog-id=78 op=LOAD Oct 29 00:35:59.058000 audit[2226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe1214c68 a2=98 a3=ffffe1214c58 items=0 ppid=2118 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.058000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 00:35:59.058000 audit: BPF prog-id=78 op=UNLOAD Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit: BPF prog-id=79 op=LOAD Oct 29 00:35:59.058000 audit[2226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe1214b18 a2=74 a3=95 items=0 ppid=2118 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.058000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 00:35:59.058000 audit: BPF prog-id=79 op=UNLOAD Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit: BPF prog-id=80 op=LOAD Oct 29 00:35:59.058000 audit[2226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe1214b48 a2=40 a3=ffffe1214b78 items=0 ppid=2118 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.058000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 00:35:59.058000 audit: BPF prog-id=80 op=UNLOAD Oct 29 00:35:59.058000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.058000 audit[2226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe1214c60 a2=50 a3=0 items=0 ppid=2118 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.058000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit: BPF prog-id=81 op=LOAD Oct 29 00:35:59.061000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcd7b5ce8 a2=98 a3=ffffcd7b5cd8 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.061000 audit: BPF prog-id=81 op=UNLOAD Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit: BPF prog-id=82 op=LOAD Oct 29 00:35:59.061000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd7b5978 a2=74 a3=95 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.061000 audit: BPF prog-id=82 op=UNLOAD Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.061000 audit: BPF prog-id=83 op=LOAD Oct 29 00:35:59.061000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd7b59d8 a2=94 a3=2 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.061000 audit: BPF prog-id=83 op=UNLOAD Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit: BPF prog-id=84 op=LOAD Oct 29 00:35:59.149000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd7b5998 a2=40 a3=ffffcd7b59c8 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.149000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.149000 audit: BPF prog-id=84 op=UNLOAD Oct 29 00:35:59.149000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.149000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcd7b5ab0 a2=50 a3=0 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.149000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7b5a08 a2=28 a3=ffffcd7b5b38 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd7b5a38 a2=28 a3=ffffcd7b5b68 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd7b58e8 a2=28 a3=ffffcd7b5a18 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7b5a58 a2=28 a3=ffffcd7b5b88 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7b5a38 a2=28 a3=ffffcd7b5b68 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7b5a28 a2=28 a3=ffffcd7b5b58 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7b5a58 a2=28 a3=ffffcd7b5b88 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd7b5a38 a2=28 a3=ffffcd7b5b68 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd7b5a58 a2=28 a3=ffffcd7b5b88 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd7b5a28 a2=28 a3=ffffcd7b5b58 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd7b5aa8 a2=28 a3=ffffcd7b5be8 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcd7b57e0 a2=50 a3=0 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit: BPF prog-id=85 op=LOAD Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcd7b57e8 a2=94 a3=5 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit: BPF prog-id=85 op=UNLOAD Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcd7b58f0 a2=50 a3=0 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcd7b5a38 a2=4 a3=3 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { confidentiality } for pid=2227 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd7b5a18 a2=94 a3=6 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.158000 audit[2227]: AVC avc: denied { confidentiality } for pid=2227 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:35:59.158000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd7b51e8 a2=94 a3=83 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.158000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { perfmon } for pid=2227 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { bpf } for pid=2227 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.159000 audit[2227]: AVC avc: denied { confidentiality } for pid=2227 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:35:59.159000 audit[2227]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd7b51e8 a2=94 a3=83 items=0 ppid=2118 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.159000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit: BPF prog-id=86 op=LOAD Oct 29 00:35:59.167000 audit[2230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeec9d2d8 a2=98 a3=ffffeec9d2c8 items=0 ppid=2118 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.167000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 00:35:59.167000 audit: BPF prog-id=86 op=UNLOAD Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit: BPF prog-id=87 op=LOAD Oct 29 00:35:59.167000 audit[2230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeec9d188 a2=74 a3=95 items=0 ppid=2118 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.167000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 00:35:59.167000 audit: BPF prog-id=87 op=UNLOAD Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.167000 audit: BPF prog-id=88 op=LOAD Oct 29 00:35:59.167000 audit[2230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeec9d1b8 a2=40 a3=ffffeec9d1e8 items=0 ppid=2118 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.167000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 00:35:59.167000 audit: BPF prog-id=88 op=UNLOAD Oct 29 00:35:59.219663 systemd-networkd[1051]: vxlan.calico: Link UP Oct 29 00:35:59.219669 systemd-networkd[1051]: vxlan.calico: Gained carrier Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit: BPF prog-id=89 op=LOAD Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf396ad8 a2=98 a3=ffffdf396ac8 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit: BPF prog-id=89 op=UNLOAD Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit: BPF prog-id=90 op=LOAD Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf3967b8 a2=74 a3=95 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit: BPF prog-id=90 op=UNLOAD Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit: BPF prog-id=91 op=LOAD Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf396818 a2=94 a3=2 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit: BPF prog-id=91 op=UNLOAD Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdf396848 a2=28 a3=ffffdf396978 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf396878 a2=28 a3=ffffdf3969a8 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf396728 a2=28 a3=ffffdf396858 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdf396898 a2=28 a3=ffffdf3969c8 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdf396878 a2=28 a3=ffffdf3969a8 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdf396868 a2=28 a3=ffffdf396998 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdf396898 a2=28 a3=ffffdf3969c8 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf396878 a2=28 a3=ffffdf3969a8 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf396898 a2=28 a3=ffffdf3969c8 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf396868 a2=28 a3=ffffdf396998 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdf3968e8 a2=28 a3=ffffdf396a28 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.238000 audit: BPF prog-id=92 op=LOAD Oct 29 00:35:59.238000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdf396708 a2=40 a3=ffffdf396738 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.238000 audit: BPF prog-id=92 op=UNLOAD Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdf396730 a2=50 a3=0 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdf396730 a2=50 a3=0 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit: BPF prog-id=93 op=LOAD Oct 29 00:35:59.239000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdf395e98 a2=94 a3=2 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.239000 audit: BPF prog-id=93 op=UNLOAD Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.239000 audit: BPF prog-id=94 op=LOAD Oct 29 00:35:59.239000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdf396028 a2=94 a3=30 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit: BPF prog-id=95 op=LOAD Oct 29 00:35:59.245000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6bb4da8 a2=98 a3=ffffe6bb4d98 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.245000 audit: BPF prog-id=95 op=UNLOAD Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit: BPF prog-id=96 op=LOAD Oct 29 00:35:59.245000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6bb4a38 a2=74 a3=95 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.245000 audit: BPF prog-id=96 op=UNLOAD Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.245000 audit: BPF prog-id=97 op=LOAD Oct 29 00:35:59.245000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6bb4a98 a2=94 a3=2 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.245000 audit: BPF prog-id=97 op=UNLOAD Oct 29 00:35:59.302347 kubelet[1453]: E1029 00:35:59.302290 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit: BPF prog-id=98 op=LOAD Oct 29 00:35:59.331000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6bb4a58 a2=40 a3=ffffe6bb4a88 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.331000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.331000 audit: BPF prog-id=98 op=UNLOAD Oct 29 00:35:59.331000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.331000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe6bb4b70 a2=50 a3=0 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.331000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6bb4ac8 a2=28 a3=ffffe6bb4bf8 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6bb4af8 a2=28 a3=ffffe6bb4c28 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6bb49a8 a2=28 a3=ffffe6bb4ad8 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6bb4b18 a2=28 a3=ffffe6bb4c48 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6bb4af8 a2=28 a3=ffffe6bb4c28 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6bb4ae8 a2=28 a3=ffffe6bb4c18 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6bb4b18 a2=28 a3=ffffe6bb4c48 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6bb4af8 a2=28 a3=ffffe6bb4c28 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6bb4b18 a2=28 a3=ffffe6bb4c48 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6bb4ae8 a2=28 a3=ffffe6bb4c18 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6bb4b68 a2=28 a3=ffffe6bb4ca8 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe6bb48a0 a2=50 a3=0 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit: BPF prog-id=99 op=LOAD Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6bb48a8 a2=94 a3=5 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit: BPF prog-id=99 op=UNLOAD Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe6bb49b0 a2=50 a3=0 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe6bb4af8 a2=4 a3=3 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.340000 audit[2260]: AVC avc: denied { confidentiality } for pid=2260 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:35:59.340000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6bb4ad8 a2=94 a3=6 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { confidentiality } for pid=2260 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:35:59.341000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6bb42a8 a2=94 a3=83 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { confidentiality } for pid=2260 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:35:59.341000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6bb42a8 a2=94 a3=83 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6bb5ce8 a2=10 a3=ffffe6bb5dd8 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6bb5ba8 a2=10 a3=ffffe6bb5c98 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6bb5b18 a2=10 a3=ffffe6bb5c98 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.341000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:35:59.341000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6bb5b18 a2=10 a3=ffffe6bb5c98 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 00:35:59.351000 audit: BPF prog-id=94 op=UNLOAD Oct 29 00:35:59.389000 audit[2288]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:35:59.389000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc847e3d0 a2=0 a3=ffffb0714fa8 items=0 ppid=2118 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.389000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:35:59.392000 audit[2286]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:35:59.392000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffffdfa8e0 a2=0 a3=ffffb9a80fa8 items=0 ppid=2118 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.392000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:35:59.393000 audit[2287]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:35:59.393000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc7a74d90 a2=0 a3=ffffb1645fa8 items=0 ppid=2118 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.393000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:35:59.400000 audit[2291]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:35:59.400000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffff5c5cc30 a2=0 a3=ffff9b29efa8 items=0 ppid=2118 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:35:59.400000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:36:00.302972 kubelet[1453]: E1029 00:36:00.302915 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:01.101699 systemd-networkd[1051]: vxlan.calico: Gained IPv6LL Oct 29 00:36:01.303252 kubelet[1453]: E1029 00:36:01.303189 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:02.303421 kubelet[1453]: E1029 00:36:02.303346 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:03.292934 kubelet[1453]: E1029 00:36:03.292880 1453 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:03.304447 kubelet[1453]: E1029 00:36:03.304387 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:03.428441 env[1217]: time="2025-10-29T00:36:03.428332153Z" level=info msg="StopPodSandbox for \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\"" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.478 [INFO][2310] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.478 [INFO][2310] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" iface="eth0" netns="/var/run/netns/cni-787eb747-41b1-973d-c7b4-638dd2e5cd0a" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.479 [INFO][2310] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" iface="eth0" netns="/var/run/netns/cni-787eb747-41b1-973d-c7b4-638dd2e5cd0a" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.479 [INFO][2310] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" iface="eth0" netns="/var/run/netns/cni-787eb747-41b1-973d-c7b4-638dd2e5cd0a" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.479 [INFO][2310] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.479 [INFO][2310] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.514 [INFO][2320] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" HandleID="k8s-pod-network.969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Workload="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.514 [INFO][2320] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.514 [INFO][2320] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.525 [WARNING][2320] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" HandleID="k8s-pod-network.969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Workload="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.525 [INFO][2320] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" HandleID="k8s-pod-network.969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Workload="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.526 [INFO][2320] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 00:36:03.530742 env[1217]: 2025-10-29 00:36:03.528 [INFO][2310] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5" Oct 29 00:36:03.531308 env[1217]: time="2025-10-29T00:36:03.531270815Z" level=info msg="TearDown network for sandbox \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\" successfully" Oct 29 00:36:03.531398 env[1217]: time="2025-10-29T00:36:03.531381123Z" level=info msg="StopPodSandbox for \"969d6c0ce14fb3650d4c362c199eb50053c879873128df56f94f6562d135f1d5\" returns successfully" Oct 29 00:36:03.531997 systemd[1]: run-netns-cni\x2d787eb747\x2d41b1\x2d973d\x2dc7b4\x2d638dd2e5cd0a.mount: Deactivated successfully. Oct 29 00:36:03.532370 env[1217]: time="2025-10-29T00:36:03.532193004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fg5pv,Uid:259fc121-6a1d-4571-8bc6-9cfbdb3834ad,Namespace:calico-system,Attempt:1,}" Oct 29 00:36:03.777080 systemd-networkd[1051]: cali72b0a330c2f: Link UP Oct 29 00:36:03.779546 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 00:36:03.779623 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali72b0a330c2f: link becomes ready Oct 29 00:36:03.779919 systemd-networkd[1051]: cali72b0a330c2f: Gained carrier Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.578 [INFO][2329] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.84-k8s-csi--node--driver--fg5pv-eth0 csi-node-driver- calico-system 259fc121-6a1d-4571-8bc6-9cfbdb3834ad 1298 0 2025-10-29 00:35:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.84 csi-node-driver-fg5pv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali72b0a330c2f [] [] }} ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.578 [INFO][2329] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.605 [INFO][2342] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" HandleID="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Workload="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.605 [INFO][2342] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" HandleID="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Workload="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003b9170), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.84", "pod":"csi-node-driver-fg5pv", "timestamp":"2025-10-29 00:36:03.6050194 +0000 UTC"}, Hostname:"10.0.0.84", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.605 [INFO][2342] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.605 [INFO][2342] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.605 [INFO][2342] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.84' Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.618 [INFO][2342] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.625 [INFO][2342] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.634 [INFO][2342] ipam/ipam.go 511: Trying affinity for 192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.638 [INFO][2342] ipam/ipam.go 158: Attempting to load block cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.640 [INFO][2342] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.640 [INFO][2342] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.643 [INFO][2342] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55 Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.698 [INFO][2342] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.771 [INFO][2342] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.95.193/26] block=192.168.95.192/26 handle="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.771 [INFO][2342] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.95.193/26] handle="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" host="10.0.0.84" Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.771 [INFO][2342] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 00:36:03.794364 env[1217]: 2025-10-29 00:36:03.771 [INFO][2342] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.95.193/26] IPv6=[] ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" HandleID="k8s-pod-network.4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Workload="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.795608 env[1217]: 2025-10-29 00:36:03.773 [INFO][2329] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-csi--node--driver--fg5pv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"259fc121-6a1d-4571-8bc6-9cfbdb3834ad", ResourceVersion:"1298", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 35, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"", Pod:"csi-node-driver-fg5pv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.95.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali72b0a330c2f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:03.795608 env[1217]: 2025-10-29 00:36:03.774 [INFO][2329] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.95.193/32] ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.795608 env[1217]: 2025-10-29 00:36:03.774 [INFO][2329] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali72b0a330c2f ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.795608 env[1217]: 2025-10-29 00:36:03.780 [INFO][2329] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.795608 env[1217]: 2025-10-29 00:36:03.780 [INFO][2329] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-csi--node--driver--fg5pv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"259fc121-6a1d-4571-8bc6-9cfbdb3834ad", ResourceVersion:"1298", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 35, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55", Pod:"csi-node-driver-fg5pv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.95.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali72b0a330c2f", MAC:"26:62:bc:b4:9b:3c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:03.795608 env[1217]: 2025-10-29 00:36:03.792 [INFO][2329] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55" Namespace="calico-system" Pod="csi-node-driver-fg5pv" WorkloadEndpoint="10.0.0.84-k8s-csi--node--driver--fg5pv-eth0" Oct 29 00:36:03.805371 env[1217]: time="2025-10-29T00:36:03.805305479Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 00:36:03.805506 env[1217]: time="2025-10-29T00:36:03.805358595Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 00:36:03.805506 env[1217]: time="2025-10-29T00:36:03.805370065Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 00:36:03.805618 env[1217]: time="2025-10-29T00:36:03.805525175Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55 pid=2368 runtime=io.containerd.runc.v2 Oct 29 00:36:03.822060 systemd[1]: Started cri-containerd-4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55.scope. Oct 29 00:36:03.805000 audit[2364]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:36:03.832246 kernel: kauditd_printk_skb: 590 callbacks suppressed Oct 29 00:36:03.832313 kernel: audit: type=1325 audit(1761698163.805:648): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:36:03.832340 kernel: audit: type=1300 audit(1761698163.805:648): arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffeed88d10 a2=0 a3=ffffbc4cafa8 items=0 ppid=2118 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:03.805000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffeed88d10 a2=0 a3=ffffbc4cafa8 items=0 ppid=2118 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:03.805000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:36:03.838491 kernel: audit: type=1327 audit(1761698163.805:648): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.846730 kernel: audit: type=1400 audit(1761698163.839:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.846795 kernel: audit: type=1400 audit(1761698163.839:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.846816 kernel: audit: type=1400 audit(1761698163.839:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.851639 kernel: audit: type=1400 audit(1761698163.839:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.851785 kernel: audit: type=1400 audit(1761698163.839:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.854399 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 00:36:03.856842 kernel: audit: type=1400 audit(1761698163.839:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.859430 kernel: audit: type=1400 audit(1761698163.839:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.839000 audit: BPF prog-id=100 op=LOAD Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2368 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:03.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643733613832623262613432626131626530356239626330333062 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2368 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:03.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643733613832623262613432626131626530356239626330333062 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit: BPF prog-id=101 op=LOAD Oct 29 00:36:03.842000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2368 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:03.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643733613832623262613432626131626530356239626330333062 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.842000 audit: BPF prog-id=102 op=LOAD Oct 29 00:36:03.842000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2368 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:03.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643733613832623262613432626131626530356239626330333062 Oct 29 00:36:03.845000 audit: BPF prog-id=102 op=UNLOAD Oct 29 00:36:03.845000 audit: BPF prog-id=101 op=UNLOAD Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:03.845000 audit: BPF prog-id=103 op=LOAD Oct 29 00:36:03.845000 audit[2379]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2368 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:03.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465643733613832623262613432626131626530356239626330333062 Oct 29 00:36:03.870227 env[1217]: time="2025-10-29T00:36:03.870178285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fg5pv,Uid:259fc121-6a1d-4571-8bc6-9cfbdb3834ad,Namespace:calico-system,Attempt:1,} returns sandbox id \"4ed73a82b2ba42ba1be05b9bc030b34d52e567342ae441cc15d37ccb99025e55\"" Oct 29 00:36:03.871926 env[1217]: time="2025-10-29T00:36:03.871887416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 00:36:04.079254 env[1217]: time="2025-10-29T00:36:04.078286427Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 00:36:04.082386 env[1217]: time="2025-10-29T00:36:04.082315360Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 00:36:04.082783 kubelet[1453]: E1029 00:36:04.082739 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 00:36:04.082863 kubelet[1453]: E1029 00:36:04.082803 1453 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 00:36:04.083279 kubelet[1453]: E1029 00:36:04.083136 1453 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sgfwk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fg5pv_calico-system(259fc121-6a1d-4571-8bc6-9cfbdb3834ad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 00:36:04.085180 env[1217]: time="2025-10-29T00:36:04.085146169Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 00:36:04.304660 kubelet[1453]: I1029 00:36:04.304023 1453 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 29 00:36:04.304660 kubelet[1453]: E1029 00:36:04.304400 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:36:04.304660 kubelet[1453]: E1029 00:36:04.304660 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:04.310632 env[1217]: time="2025-10-29T00:36:04.310583837Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 00:36:04.311594 env[1217]: time="2025-10-29T00:36:04.311552488Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 00:36:04.312191 kubelet[1453]: E1029 00:36:04.311767 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 00:36:04.312191 kubelet[1453]: E1029 00:36:04.311828 1453 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 00:36:04.312191 kubelet[1453]: E1029 00:36:04.311951 1453 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sgfwk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fg5pv_calico-system(259fc121-6a1d-4571-8bc6-9cfbdb3834ad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 00:36:04.313365 kubelet[1453]: E1029 00:36:04.313293 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:36:04.478226 kubelet[1453]: E1029 00:36:04.478115 1453 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 29 00:36:04.479778 kubelet[1453]: E1029 00:36:04.479732 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:36:05.005656 systemd-networkd[1051]: cali72b0a330c2f: Gained IPv6LL Oct 29 00:36:05.305839 kubelet[1453]: E1029 00:36:05.305703 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:05.481230 kubelet[1453]: E1029 00:36:05.481188 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:36:06.306194 kubelet[1453]: E1029 00:36:06.306140 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:07.306482 kubelet[1453]: E1029 00:36:07.306439 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:08.306623 kubelet[1453]: E1029 00:36:08.306584 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:09.307597 kubelet[1453]: E1029 00:36:09.307549 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:09.431539 env[1217]: time="2025-10-29T00:36:09.430682004Z" level=info msg="StopPodSandbox for \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\"" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.471 [INFO][2476] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.472 [INFO][2476] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" iface="eth0" netns="/var/run/netns/cni-d64bb2e5-ace4-c667-c4ff-496fcf22fcb7" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.472 [INFO][2476] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" iface="eth0" netns="/var/run/netns/cni-d64bb2e5-ace4-c667-c4ff-496fcf22fcb7" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.472 [INFO][2476] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" iface="eth0" netns="/var/run/netns/cni-d64bb2e5-ace4-c667-c4ff-496fcf22fcb7" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.472 [INFO][2476] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.472 [INFO][2476] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.491 [INFO][2485] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" HandleID="k8s-pod-network.522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Workload="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.491 [INFO][2485] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.491 [INFO][2485] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.501 [WARNING][2485] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" HandleID="k8s-pod-network.522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Workload="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.501 [INFO][2485] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" HandleID="k8s-pod-network.522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Workload="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.503 [INFO][2485] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 00:36:09.505941 env[1217]: 2025-10-29 00:36:09.504 [INFO][2476] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51" Oct 29 00:36:09.506508 env[1217]: time="2025-10-29T00:36:09.506471833Z" level=info msg="TearDown network for sandbox \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\" successfully" Oct 29 00:36:09.506597 env[1217]: time="2025-10-29T00:36:09.506580319Z" level=info msg="StopPodSandbox for \"522a42aa413f7d84d910d847f57b27a766831363a821778b1da0e94f1d3a7f51\" returns successfully" Oct 29 00:36:09.507364 env[1217]: time="2025-10-29T00:36:09.507315319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bgp8h,Uid:6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8,Namespace:default,Attempt:1,}" Oct 29 00:36:09.507926 systemd[1]: run-netns-cni\x2dd64bb2e5\x2dace4\x2dc667\x2dc4ff\x2d496fcf22fcb7.mount: Deactivated successfully. Oct 29 00:36:09.624160 systemd-networkd[1051]: calicbd2dc9744a: Link UP Oct 29 00:36:09.626862 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 00:36:09.627075 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicbd2dc9744a: link becomes ready Oct 29 00:36:09.627079 systemd-networkd[1051]: calicbd2dc9744a: Gained carrier Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.549 [INFO][2493] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0 nginx-deployment-7fcdb87857- default 6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8 1346 0 2025-10-29 00:35:54 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.84 nginx-deployment-7fcdb87857-bgp8h eth0 default [] [] [kns.default ksa.default.default] calicbd2dc9744a [] [] }} ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.549 [INFO][2493] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.571 [INFO][2508] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" HandleID="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Workload="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.571 [INFO][2508] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" HandleID="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Workload="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c6e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.84", "pod":"nginx-deployment-7fcdb87857-bgp8h", "timestamp":"2025-10-29 00:36:09.571655441 +0000 UTC"}, Hostname:"10.0.0.84", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.571 [INFO][2508] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.571 [INFO][2508] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.571 [INFO][2508] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.84' Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.586 [INFO][2508] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.593 [INFO][2508] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.598 [INFO][2508] ipam/ipam.go 511: Trying affinity for 192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.601 [INFO][2508] ipam/ipam.go 158: Attempting to load block cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.604 [INFO][2508] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.604 [INFO][2508] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.606 [INFO][2508] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6 Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.611 [INFO][2508] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.618 [INFO][2508] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.95.194/26] block=192.168.95.192/26 handle="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.618 [INFO][2508] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.95.194/26] handle="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" host="10.0.0.84" Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.618 [INFO][2508] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 00:36:09.635070 env[1217]: 2025-10-29 00:36:09.619 [INFO][2508] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.95.194/26] IPv6=[] ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" HandleID="k8s-pod-network.3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Workload="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.636751 env[1217]: 2025-10-29 00:36:09.620 [INFO][2493] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8", ResourceVersion:"1346", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 35, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-bgp8h", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicbd2dc9744a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:09.636751 env[1217]: 2025-10-29 00:36:09.620 [INFO][2493] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.95.194/32] ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.636751 env[1217]: 2025-10-29 00:36:09.620 [INFO][2493] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicbd2dc9744a ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.636751 env[1217]: 2025-10-29 00:36:09.624 [INFO][2493] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.636751 env[1217]: 2025-10-29 00:36:09.627 [INFO][2493] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8", ResourceVersion:"1346", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 35, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6", Pod:"nginx-deployment-7fcdb87857-bgp8h", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicbd2dc9744a", MAC:"56:be:01:3e:8f:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:09.636751 env[1217]: 2025-10-29 00:36:09.633 [INFO][2493] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6" Namespace="default" Pod="nginx-deployment-7fcdb87857-bgp8h" WorkloadEndpoint="10.0.0.84-k8s-nginx--deployment--7fcdb87857--bgp8h-eth0" Oct 29 00:36:09.646265 env[1217]: time="2025-10-29T00:36:09.646206163Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 00:36:09.646452 env[1217]: time="2025-10-29T00:36:09.646246445Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 00:36:09.646452 env[1217]: time="2025-10-29T00:36:09.646257565Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 00:36:09.646452 env[1217]: time="2025-10-29T00:36:09.646364171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6 pid=2535 runtime=io.containerd.runc.v2 Oct 29 00:36:09.646000 audit[2536]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:36:09.649267 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 29 00:36:09.649326 kernel: audit: type=1325 audit(1761698169.646:667): table=filter:70 family=2 entries=42 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:36:09.646000 audit[2536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffda639020 a2=0 a3=ffffbe4d8fa8 items=0 ppid=2118 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:09.653269 kernel: audit: type=1300 audit(1761698169.646:667): arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffda639020 a2=0 a3=ffffbe4d8fa8 items=0 ppid=2118 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:09.646000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:36:09.659629 kernel: audit: type=1327 audit(1761698169.646:667): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:36:09.662786 systemd[1]: Started cri-containerd-3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6.scope. Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679349 kernel: audit: type=1400 audit(1761698169.673:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679437 kernel: audit: type=1400 audit(1761698169.673:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679459 kernel: audit: type=1400 audit(1761698169.673:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.684351 kernel: audit: type=1400 audit(1761698169.673:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.684432 kernel: audit: type=1400 audit(1761698169.673:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.687396 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 00:36:09.687638 kernel: audit: type=1400 audit(1761698169.673:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.697422 kernel: audit: type=1400 audit(1761698169.673:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit: BPF prog-id=104 op=LOAD Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:09.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356434316364393562333331353962353137343337393939633230 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:09.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356434316364393562333331353962353137343337393939633230 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.676000 audit: BPF prog-id=105 op=LOAD Oct 29 00:36:09.676000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:09.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356434316364393562333331353962353137343337393939633230 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.679000 audit: BPF prog-id=106 op=LOAD Oct 29 00:36:09.679000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:09.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356434316364393562333331353962353137343337393939633230 Oct 29 00:36:09.681000 audit: BPF prog-id=106 op=UNLOAD Oct 29 00:36:09.681000 audit: BPF prog-id=105 op=UNLOAD Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:09.681000 audit: BPF prog-id=107 op=LOAD Oct 29 00:36:09.681000 audit[2545]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:09.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356434316364393562333331353962353137343337393939633230 Oct 29 00:36:09.710088 env[1217]: time="2025-10-29T00:36:09.710049178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-bgp8h,Uid:6f0ce5db-2d9a-48f5-b198-c1be1c7a95c8,Namespace:default,Attempt:1,} returns sandbox id \"3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6\"" Oct 29 00:36:09.711431 env[1217]: time="2025-10-29T00:36:09.711401852Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 29 00:36:10.308584 kubelet[1453]: E1029 00:36:10.308530 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:11.278086 systemd-networkd[1051]: calicbd2dc9744a: Gained IPv6LL Oct 29 00:36:11.309523 kubelet[1453]: E1029 00:36:11.309464 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:11.846061 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount716313313.mount: Deactivated successfully. Oct 29 00:36:12.310311 kubelet[1453]: E1029 00:36:12.310181 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:13.108527 env[1217]: time="2025-10-29T00:36:13.108467434Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:13.111748 env[1217]: time="2025-10-29T00:36:13.111705136Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:13.113602 env[1217]: time="2025-10-29T00:36:13.113574498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:13.115292 env[1217]: time="2025-10-29T00:36:13.115268212Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:13.116078 env[1217]: time="2025-10-29T00:36:13.116050246Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Oct 29 00:36:13.118475 env[1217]: time="2025-10-29T00:36:13.118441151Z" level=info msg="CreateContainer within sandbox \"3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 29 00:36:13.129712 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4097398731.mount: Deactivated successfully. Oct 29 00:36:13.132890 env[1217]: time="2025-10-29T00:36:13.132850061Z" level=info msg="CreateContainer within sandbox \"3a5d41cd95b33159b517437999c20f38dcb9c8103d008f9239ee98e16469a5d6\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"33483a3c9f4ad36a6f6709ddbc5b5faf3db90f323944136038abcc7702a7ac34\"" Oct 29 00:36:13.133804 env[1217]: time="2025-10-29T00:36:13.133776302Z" level=info msg="StartContainer for \"33483a3c9f4ad36a6f6709ddbc5b5faf3db90f323944136038abcc7702a7ac34\"" Oct 29 00:36:13.153350 systemd[1]: Started cri-containerd-33483a3c9f4ad36a6f6709ddbc5b5faf3db90f323944136038abcc7702a7ac34.scope. Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit: BPF prog-id=108 op=LOAD Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2535 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:13.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343833613363396634616433366136663637303964646263356235 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2535 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:13.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343833613363396634616433366136663637303964646263356235 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit: BPF prog-id=109 op=LOAD Oct 29 00:36:13.171000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2535 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:13.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343833613363396634616433366136663637303964646263356235 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit: BPF prog-id=110 op=LOAD Oct 29 00:36:13.171000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2535 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:13.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343833613363396634616433366136663637303964646263356235 Oct 29 00:36:13.171000 audit: BPF prog-id=110 op=UNLOAD Oct 29 00:36:13.171000 audit: BPF prog-id=109 op=UNLOAD Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:13.171000 audit: BPF prog-id=111 op=LOAD Oct 29 00:36:13.171000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2535 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:13.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333343833613363396634616433366136663637303964646263356235 Oct 29 00:36:13.189006 env[1217]: time="2025-10-29T00:36:13.188960156Z" level=info msg="StartContainer for \"33483a3c9f4ad36a6f6709ddbc5b5faf3db90f323944136038abcc7702a7ac34\" returns successfully" Oct 29 00:36:13.310802 kubelet[1453]: E1029 00:36:13.310748 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:14.311614 kubelet[1453]: E1029 00:36:14.311567 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:15.312187 kubelet[1453]: E1029 00:36:15.312137 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:16.313370 kubelet[1453]: E1029 00:36:16.313273 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:17.007000 audit[2629]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.012741 kernel: kauditd_printk_skb: 107 callbacks suppressed Oct 29 00:36:17.012856 kernel: audit: type=1325 audit(1761698177.007:704): table=filter:71 family=2 entries=26 op=nft_register_rule pid=2629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.012881 kernel: audit: type=1300 audit(1761698177.007:704): arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffebb6cf30 a2=0 a3=1 items=0 ppid=1714 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.007000 audit[2629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffebb6cf30 a2=0 a3=1 items=0 ppid=1714 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.007000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:17.018024 kernel: audit: type=1327 audit(1761698177.007:704): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:17.021000 audit[2629]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.021000 audit[2629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffebb6cf30 a2=0 a3=1 items=0 ppid=1714 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.033124 kernel: audit: type=1325 audit(1761698177.021:705): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.033212 kernel: audit: type=1300 audit(1761698177.021:705): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffebb6cf30 a2=0 a3=1 items=0 ppid=1714 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.033248 kernel: audit: type=1327 audit(1761698177.021:705): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:17.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:17.041000 audit[2631]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.041000 audit[2631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffd1179880 a2=0 a3=1 items=0 ppid=1714 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.049244 kernel: audit: type=1325 audit(1761698177.041:706): table=filter:73 family=2 entries=38 op=nft_register_rule pid=2631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.049358 kernel: audit: type=1300 audit(1761698177.041:706): arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffd1179880 a2=0 a3=1 items=0 ppid=1714 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.049383 kernel: audit: type=1327 audit(1761698177.041:706): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:17.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:17.054767 kubelet[1453]: I1029 00:36:17.054690 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-bgp8h" podStartSLOduration=19.648595333 podStartE2EDuration="23.054655592s" podCreationTimestamp="2025-10-29 00:35:54 +0000 UTC" firstStartedPulling="2025-10-29 00:36:09.711142037 +0000 UTC m=+27.267017738" lastFinishedPulling="2025-10-29 00:36:13.117202296 +0000 UTC m=+30.673077997" observedRunningTime="2025-10-29 00:36:13.511768841 +0000 UTC m=+31.067644542" watchObservedRunningTime="2025-10-29 00:36:17.054655592 +0000 UTC m=+34.610531293" Oct 29 00:36:17.054000 audit[2631]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.054000 audit[2631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd1179880 a2=0 a3=1 items=0 ppid=1714 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:17.059552 kernel: audit: type=1325 audit(1761698177.054:707): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:17.063824 systemd[1]: Created slice kubepods-besteffort-pode00b84ea_e5a7_424f_829d_93fb69e13f7e.slice. Oct 29 00:36:17.139074 kubelet[1453]: I1029 00:36:17.139018 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nrh9q\" (UniqueName: \"kubernetes.io/projected/e00b84ea-e5a7-424f-829d-93fb69e13f7e-kube-api-access-nrh9q\") pod \"nfs-server-provisioner-0\" (UID: \"e00b84ea-e5a7-424f-829d-93fb69e13f7e\") " pod="default/nfs-server-provisioner-0" Oct 29 00:36:17.139074 kubelet[1453]: I1029 00:36:17.139072 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/e00b84ea-e5a7-424f-829d-93fb69e13f7e-data\") pod \"nfs-server-provisioner-0\" (UID: \"e00b84ea-e5a7-424f-829d-93fb69e13f7e\") " pod="default/nfs-server-provisioner-0" Oct 29 00:36:17.313853 kubelet[1453]: E1029 00:36:17.313690 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:17.367507 env[1217]: time="2025-10-29T00:36:17.367455783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e00b84ea-e5a7-424f-829d-93fb69e13f7e,Namespace:default,Attempt:0,}" Oct 29 00:36:17.431094 env[1217]: time="2025-10-29T00:36:17.430863539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 00:36:17.521883 systemd-networkd[1051]: cali60e51b789ff: Link UP Oct 29 00:36:17.523282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 00:36:17.524545 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 29 00:36:17.523589 systemd-networkd[1051]: cali60e51b789ff: Gained carrier Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.425 [INFO][2639] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.84-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default e00b84ea-e5a7-424f-829d-93fb69e13f7e 1415 0 2025-10-29 00:36:17 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.84 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.425 [INFO][2639] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.468 [INFO][2648] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" HandleID="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Workload="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.469 [INFO][2648] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" HandleID="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Workload="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dd590), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.84", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-29 00:36:17.468370462 +0000 UTC"}, Hostname:"10.0.0.84", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.469 [INFO][2648] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.469 [INFO][2648] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.469 [INFO][2648] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.84' Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.482 [INFO][2648] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.487 [INFO][2648] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.493 [INFO][2648] ipam/ipam.go 511: Trying affinity for 192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.495 [INFO][2648] ipam/ipam.go 158: Attempting to load block cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.499 [INFO][2648] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.499 [INFO][2648] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.503 [INFO][2648] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4 Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.509 [INFO][2648] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.517 [INFO][2648] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.95.195/26] block=192.168.95.192/26 handle="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.517 [INFO][2648] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.95.195/26] handle="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" host="10.0.0.84" Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.517 [INFO][2648] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 00:36:17.537989 env[1217]: 2025-10-29 00:36:17.518 [INFO][2648] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.95.195/26] IPv6=[] ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" HandleID="k8s-pod-network.0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Workload="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" Oct 29 00:36:17.538691 env[1217]: 2025-10-29 00:36:17.519 [INFO][2639] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e00b84ea-e5a7-424f-829d-93fb69e13f7e", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 36, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.95.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:17.538691 env[1217]: 2025-10-29 00:36:17.519 [INFO][2639] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.95.195/32] ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" Oct 29 00:36:17.538691 env[1217]: 2025-10-29 00:36:17.519 [INFO][2639] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" Oct 29 00:36:17.538691 env[1217]: 2025-10-29 00:36:17.524 [INFO][2639] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" Oct 29 00:36:17.538842 env[1217]: 2025-10-29 00:36:17.525 [INFO][2639] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e00b84ea-e5a7-424f-829d-93fb69e13f7e", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 36, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.95.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"72:a8:47:e7:86:56", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:17.538842 env[1217]: 2025-10-29 00:36:17.536 [INFO][2639] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.84-k8s-nfs--server--provisioner--0-eth0" Oct 29 00:36:17.555000 audit[2667]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:36:17.555000 audit[2667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffda387560 a2=0 a3=ffffb4417fa8 items=0 ppid=2118 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.555000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:36:17.567356 env[1217]: time="2025-10-29T00:36:17.566952139Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 00:36:17.567833 env[1217]: time="2025-10-29T00:36:17.567696685Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 00:36:17.567833 env[1217]: time="2025-10-29T00:36:17.567729246Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 00:36:17.568246 env[1217]: time="2025-10-29T00:36:17.568029657Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4 pid=2676 runtime=io.containerd.runc.v2 Oct 29 00:36:17.585256 systemd[1]: Started cri-containerd-0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4.scope. Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.602000 audit: BPF prog-id=112 op=LOAD Oct 29 00:36:17.605052 env[1217]: time="2025-10-29T00:36:17.604813474Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2676 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323733373832393461326634613137353639303038383331313130 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2676 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323733373832393461326634613137353639303038383331313130 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.604000 audit: BPF prog-id=113 op=LOAD Oct 29 00:36:17.604000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2676 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323733373832393461326634613137353639303038383331313130 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit: BPF prog-id=114 op=LOAD Oct 29 00:36:17.605000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2676 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323733373832393461326634613137353639303038383331313130 Oct 29 00:36:17.605000 audit: BPF prog-id=114 op=UNLOAD Oct 29 00:36:17.605000 audit: BPF prog-id=113 op=UNLOAD Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:17.605000 audit: BPF prog-id=115 op=LOAD Oct 29 00:36:17.605000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2676 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:17.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066323733373832393461326634613137353639303038383331313130 Oct 29 00:36:17.607446 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 00:36:17.624841 env[1217]: time="2025-10-29T00:36:17.624795258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e00b84ea-e5a7-424f-829d-93fb69e13f7e,Namespace:default,Attempt:0,} returns sandbox id \"0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4\"" Oct 29 00:36:17.643648 env[1217]: time="2025-10-29T00:36:17.643570561Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 00:36:17.643899 kubelet[1453]: E1029 00:36:17.643845 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 00:36:17.643974 kubelet[1453]: E1029 00:36:17.643907 1453 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 00:36:17.644215 kubelet[1453]: E1029 00:36:17.644161 1453 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sgfwk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fg5pv_calico-system(259fc121-6a1d-4571-8bc6-9cfbdb3834ad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 00:36:17.644445 env[1217]: time="2025-10-29T00:36:17.644418510Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 29 00:36:18.253790 systemd[1]: run-containerd-runc-k8s.io-0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4-runc.Fin0KK.mount: Deactivated successfully. Oct 29 00:36:18.314249 kubelet[1453]: E1029 00:36:18.314191 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:18.573700 systemd-networkd[1051]: cali60e51b789ff: Gained IPv6LL Oct 29 00:36:19.314535 kubelet[1453]: E1029 00:36:19.314468 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:19.818288 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1035666095.mount: Deactivated successfully. Oct 29 00:36:19.961472 update_engine[1205]: I1029 00:36:19.961405 1205 update_attempter.cc:509] Updating boot flags... Oct 29 00:36:20.315295 kubelet[1453]: E1029 00:36:20.315253 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:21.315479 kubelet[1453]: E1029 00:36:21.315428 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:21.803166 env[1217]: time="2025-10-29T00:36:21.803108028Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:21.804875 env[1217]: time="2025-10-29T00:36:21.804840557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:21.806692 env[1217]: time="2025-10-29T00:36:21.806663410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:21.808826 env[1217]: time="2025-10-29T00:36:21.808796671Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:21.809481 env[1217]: time="2025-10-29T00:36:21.809450250Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Oct 29 00:36:21.811610 env[1217]: time="2025-10-29T00:36:21.811572191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 00:36:21.812220 env[1217]: time="2025-10-29T00:36:21.812189408Z" level=info msg="CreateContainer within sandbox \"0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 29 00:36:21.835002 env[1217]: time="2025-10-29T00:36:21.834932501Z" level=info msg="CreateContainer within sandbox \"0f27378294a2f4a17569008831110abccdcb195520afb03f0fc51e48bc7673e4\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"2252e5962d463dd6afa1ad2234db69b2d7dbd04293d6249b640fd563a47606aa\"" Oct 29 00:36:21.835904 env[1217]: time="2025-10-29T00:36:21.835857168Z" level=info msg="StartContainer for \"2252e5962d463dd6afa1ad2234db69b2d7dbd04293d6249b640fd563a47606aa\"" Oct 29 00:36:21.856677 systemd[1]: Started cri-containerd-2252e5962d463dd6afa1ad2234db69b2d7dbd04293d6249b640fd563a47606aa.scope. Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit: BPF prog-id=116 op=LOAD Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2676 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:21.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353265353936326434363364643661666131616432323334646236 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2676 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:21.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353265353936326434363364643661666131616432323334646236 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit: BPF prog-id=117 op=LOAD Oct 29 00:36:21.874000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2676 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:21.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353265353936326434363364643661666131616432323334646236 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit: BPF prog-id=118 op=LOAD Oct 29 00:36:21.874000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2676 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:21.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353265353936326434363364643661666131616432323334646236 Oct 29 00:36:21.874000 audit: BPF prog-id=118 op=UNLOAD Oct 29 00:36:21.874000 audit: BPF prog-id=117 op=UNLOAD Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:21.874000 audit: BPF prog-id=119 op=LOAD Oct 29 00:36:21.874000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2676 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:21.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353265353936326434363364643661666131616432323334646236 Oct 29 00:36:21.893312 env[1217]: time="2025-10-29T00:36:21.893205814Z" level=info msg="StartContainer for \"2252e5962d463dd6afa1ad2234db69b2d7dbd04293d6249b640fd563a47606aa\" returns successfully" Oct 29 00:36:21.949000 audit[2768]: AVC avc: denied { search } for pid=2768 comm="rpcbind" name="crypto" dev="proc" ino=17079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 00:36:21.949000 audit[2768]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa3bdf000 a2=0 a3=0 items=0 ppid=2750 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 key=(null) Oct 29 00:36:21.949000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 29 00:36:21.989000 audit[2773]: AVC avc: denied { search } for pid=2773 comm="dbus-daemon" name="crypto" dev="proc" ino=17079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 00:36:21.989000 audit[2773]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb265f000 a2=0 a3=0 items=0 ppid=2750 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 key=(null) Oct 29 00:36:21.989000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 29 00:36:21.992000 audit[2774]: AVC avc: denied { watch } for pid=2774 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536931 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c376,c596 tclass=dir permissive=0 Oct 29 00:36:21.992000 audit[2774]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae84d0820 a2=2c8 a3=aaaae84aaa60 items=0 ppid=2750 pid=2774 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 key=(null) Oct 29 00:36:21.992000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 29 00:36:21.997000 audit[2775]: AVC avc: denied { read } for pid=2775 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=16196 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 29 00:36:21.997000 audit[2775]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb686a570 a2=80000 a3=0 items=0 ppid=2750 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 key=(null) Oct 29 00:36:21.997000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 29 00:36:21.998000 audit[2775]: AVC avc: denied { search } for pid=2775 comm="ganesha.nfsd" name="crypto" dev="proc" ino=17079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 29 00:36:21.998000 audit[2775]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb5bff000 a2=0 a3=0 items=0 ppid=2750 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c596 key=(null) Oct 29 00:36:21.998000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 29 00:36:22.029551 env[1217]: time="2025-10-29T00:36:22.029055356Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 00:36:22.032558 env[1217]: time="2025-10-29T00:36:22.031043770Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 00:36:22.032701 kubelet[1453]: E1029 00:36:22.031276 1453 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 00:36:22.032701 kubelet[1453]: E1029 00:36:22.031335 1453 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 00:36:22.032701 kubelet[1453]: E1029 00:36:22.031474 1453 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sgfwk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fg5pv_calico-system(259fc121-6a1d-4571-8bc6-9cfbdb3834ad): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 00:36:22.033045 kubelet[1453]: E1029 00:36:22.032960 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:36:22.316130 kubelet[1453]: E1029 00:36:22.316073 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:22.525154 kubelet[1453]: I1029 00:36:22.525010 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.340502286 podStartE2EDuration="5.524994383s" podCreationTimestamp="2025-10-29 00:36:17 +0000 UTC" firstStartedPulling="2025-10-29 00:36:17.626313752 +0000 UTC m=+35.182189413" lastFinishedPulling="2025-10-29 00:36:21.810805809 +0000 UTC m=+39.366681510" observedRunningTime="2025-10-29 00:36:22.524740056 +0000 UTC m=+40.080615757" watchObservedRunningTime="2025-10-29 00:36:22.524994383 +0000 UTC m=+40.080870084" Oct 29 00:36:22.536000 audit[2793]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:22.539050 kernel: kauditd_printk_skb: 134 callbacks suppressed Oct 29 00:36:22.539112 kernel: audit: type=1325 audit(1761698182.536:750): table=filter:76 family=2 entries=26 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:22.536000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffcd71edf0 a2=0 a3=1 items=0 ppid=1714 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:22.544904 kernel: audit: type=1300 audit(1761698182.536:750): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffcd71edf0 a2=0 a3=1 items=0 ppid=1714 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:22.544957 kernel: audit: type=1327 audit(1761698182.536:750): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:22.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:22.548000 audit[2793]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:22.548000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffcd71edf0 a2=0 a3=1 items=0 ppid=1714 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:22.556192 kernel: audit: type=1325 audit(1761698182.548:751): table=nat:77 family=2 entries=104 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 00:36:22.556243 kernel: audit: type=1300 audit(1761698182.548:751): arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffcd71edf0 a2=0 a3=1 items=0 ppid=1714 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:22.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:22.558092 kernel: audit: type=1327 audit(1761698182.548:751): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 00:36:22.825996 systemd[1]: run-containerd-runc-k8s.io-2252e5962d463dd6afa1ad2234db69b2d7dbd04293d6249b640fd563a47606aa-runc.Q0Ao0P.mount: Deactivated successfully. Oct 29 00:36:23.293761 kubelet[1453]: E1029 00:36:23.293696 1453 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:23.317244 kubelet[1453]: E1029 00:36:23.317198 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:24.317902 kubelet[1453]: E1029 00:36:24.317865 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:25.318371 kubelet[1453]: E1029 00:36:25.318317 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:26.319529 kubelet[1453]: E1029 00:36:26.319470 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:27.320467 kubelet[1453]: E1029 00:36:27.320403 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:28.321655 kubelet[1453]: E1029 00:36:28.321609 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:29.322536 kubelet[1453]: E1029 00:36:29.322478 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:30.323233 kubelet[1453]: E1029 00:36:30.323176 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:31.204435 systemd[1]: Created slice kubepods-besteffort-pode0b806b9_effb_43b7_9a6b_54705710f872.slice. Oct 29 00:36:31.231915 kubelet[1453]: I1029 00:36:31.231863 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-9fdab40f-cd5d-4528-8ac2-cf3057e51c18\" (UniqueName: \"kubernetes.io/nfs/e0b806b9-effb-43b7-9a6b-54705710f872-pvc-9fdab40f-cd5d-4528-8ac2-cf3057e51c18\") pod \"test-pod-1\" (UID: \"e0b806b9-effb-43b7-9a6b-54705710f872\") " pod="default/test-pod-1" Oct 29 00:36:31.231915 kubelet[1453]: I1029 00:36:31.231911 1453 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-td6t6\" (UniqueName: \"kubernetes.io/projected/e0b806b9-effb-43b7-9a6b-54705710f872-kube-api-access-td6t6\") pod \"test-pod-1\" (UID: \"e0b806b9-effb-43b7-9a6b-54705710f872\") " pod="default/test-pod-1" Oct 29 00:36:31.324391 kubelet[1453]: E1029 00:36:31.324321 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:31.350596 kernel: Failed to create system directory netfs Oct 29 00:36:31.350694 kernel: Failed to create system directory netfs Oct 29 00:36:31.350715 kernel: audit: type=1400 audit(1761698191.345:752): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.345000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.345000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.355984 kernel: audit: type=1400 audit(1761698191.345:752): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.356076 kernel: Failed to create system directory netfs Oct 29 00:36:31.356099 kernel: audit: type=1400 audit(1761698191.345:752): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.345000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.365234 kernel: Failed to create system directory netfs Oct 29 00:36:31.366396 kernel: audit: type=1400 audit(1761698191.345:752): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.345000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.345000 audit[2802]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaabfe025e0 a1=12c14 a2=aaaab41ae028 a3=aaaabfdf3010 items=0 ppid=1032 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.375847 kernel: audit: type=1300 audit(1761698191.345:752): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaabfe025e0 a1=12c14 a2=aaaab41ae028 a3=aaaabfdf3010 items=0 ppid=1032 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.377279 kernel: audit: type=1327 audit(1761698191.345:752): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 00:36:31.345000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 00:36:31.381994 kernel: Failed to create system directory fscache Oct 29 00:36:31.382078 kernel: audit: type=1400 audit(1761698191.369:753): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.382106 kernel: Failed to create system directory fscache Oct 29 00:36:31.382122 kernel: audit: type=1400 audit(1761698191.369:753): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.386377 kernel: Failed to create system directory fscache Oct 29 00:36:31.386458 kernel: audit: type=1400 audit(1761698191.369:753): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.389839 kernel: Failed to create system directory fscache Oct 29 00:36:31.389889 kernel: audit: type=1400 audit(1761698191.369:753): avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.392904 kernel: Failed to create system directory fscache Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.393589 kernel: Failed to create system directory fscache Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.394788 kernel: Failed to create system directory fscache Oct 29 00:36:31.394827 kernel: Failed to create system directory fscache Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.396582 kernel: Failed to create system directory fscache Oct 29 00:36:31.396609 kernel: Failed to create system directory fscache Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.397581 kernel: Failed to create system directory fscache Oct 29 00:36:31.397675 kernel: Failed to create system directory fscache Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.398649 kernel: Failed to create system directory fscache Oct 29 00:36:31.398702 kernel: Failed to create system directory fscache Oct 29 00:36:31.369000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.400542 kernel: FS-Cache: Loaded Oct 29 00:36:31.369000 audit[2802]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac0015210 a1=4c344 a2=aaaab41ae028 a3=aaaabfdf3010 items=0 ppid=1032 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.369000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 00:36:31.424627 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.424752 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.424773 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.425609 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.427221 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.427273 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.428534 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.429139 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.431156 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.432257 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.432368 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.434467 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.435156 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.436893 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.437057 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.438996 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.439048 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.441460 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.441599 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.441629 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.442655 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.444348 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.444388 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.445189 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.447098 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.447339 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.449111 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.449174 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.450812 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.450868 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.450893 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.452664 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.452912 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.454786 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.455373 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.456288 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.458454 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.459691 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.459773 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.460995 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.461160 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.462964 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.465246 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.466369 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.466483 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.466578 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.466610 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.467643 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.468048 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.469885 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.469940 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.472140 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.472200 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.474009 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.474078 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.475894 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.475977 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.479168 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.479370 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.479594 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.480348 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.481388 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.483572 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.484301 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.484407 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.486211 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.486383 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.487952 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.488206 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.489748 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.490610 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.490725 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.491672 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.494030 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.494104 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.495177 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.497445 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.497594 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.500713 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.500940 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.500988 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.503279 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.503381 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.503410 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.505340 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.505414 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.507810 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.508385 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.510391 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.510504 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.511336 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.513372 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.513415 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.515532 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.515647 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.517145 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.517206 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.518696 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.518752 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.519882 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.519915 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.522073 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.522124 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.522143 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.524203 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.524256 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.524274 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.525631 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.525712 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.526806 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.526835 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.528043 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.528084 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.528865 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.530179 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.530215 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.531726 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.531766 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.532893 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.532930 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.534080 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.534111 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.535761 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.535797 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.535813 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.415000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.536896 kernel: Failed to create system directory sunrpc Oct 29 00:36:31.542782 kernel: RPC: Registered named UNIX socket transport module. Oct 29 00:36:31.542847 kernel: RPC: Registered udp transport module. Oct 29 00:36:31.542871 kernel: RPC: Registered tcp transport module. Oct 29 00:36:31.544379 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 29 00:36:31.415000 audit[2802]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac0061560 a1=14a804 a2=aaaab41ae028 a3=aaaabfdf3010 items=6 ppid=1032 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.415000 audit: CWD cwd="/" Oct 29 00:36:31.415000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:36:31.415000 audit: PATH item=1 name=(null) inode=17183 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:36:31.415000 audit: PATH item=2 name=(null) inode=17183 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:36:31.415000 audit: PATH item=3 name=(null) inode=17184 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:36:31.415000 audit: PATH item=4 name=(null) inode=17183 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:36:31.415000 audit: PATH item=5 name=(null) inode=17185 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 00:36:31.415000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.571785 kernel: Failed to create system directory nfs Oct 29 00:36:31.571847 kernel: Failed to create system directory nfs Oct 29 00:36:31.571870 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.572978 kernel: Failed to create system directory nfs Oct 29 00:36:31.573007 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.574089 kernel: Failed to create system directory nfs Oct 29 00:36:31.574117 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.575694 kernel: Failed to create system directory nfs Oct 29 00:36:31.575725 kernel: Failed to create system directory nfs Oct 29 00:36:31.575742 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.576815 kernel: Failed to create system directory nfs Oct 29 00:36:31.576840 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.577914 kernel: Failed to create system directory nfs Oct 29 00:36:31.577958 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.579003 kernel: Failed to create system directory nfs Oct 29 00:36:31.579024 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.580698 kernel: Failed to create system directory nfs Oct 29 00:36:31.580757 kernel: Failed to create system directory nfs Oct 29 00:36:31.580782 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.581763 kernel: Failed to create system directory nfs Oct 29 00:36:31.581792 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.582839 kernel: Failed to create system directory nfs Oct 29 00:36:31.582869 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.584066 kernel: Failed to create system directory nfs Oct 29 00:36:31.584111 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.585733 kernel: Failed to create system directory nfs Oct 29 00:36:31.585759 kernel: Failed to create system directory nfs Oct 29 00:36:31.585775 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.586857 kernel: Failed to create system directory nfs Oct 29 00:36:31.586909 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.587969 kernel: Failed to create system directory nfs Oct 29 00:36:31.587994 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.589069 kernel: Failed to create system directory nfs Oct 29 00:36:31.589091 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.590796 kernel: Failed to create system directory nfs Oct 29 00:36:31.590830 kernel: Failed to create system directory nfs Oct 29 00:36:31.590851 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.591928 kernel: Failed to create system directory nfs Oct 29 00:36:31.591965 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.593041 kernel: Failed to create system directory nfs Oct 29 00:36:31.593066 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.594667 kernel: Failed to create system directory nfs Oct 29 00:36:31.594690 kernel: Failed to create system directory nfs Oct 29 00:36:31.594706 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.595764 kernel: Failed to create system directory nfs Oct 29 00:36:31.595786 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.596957 kernel: Failed to create system directory nfs Oct 29 00:36:31.596988 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.598095 kernel: Failed to create system directory nfs Oct 29 00:36:31.598151 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.599680 kernel: Failed to create system directory nfs Oct 29 00:36:31.599698 kernel: Failed to create system directory nfs Oct 29 00:36:31.599712 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.600768 kernel: Failed to create system directory nfs Oct 29 00:36:31.600811 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.601857 kernel: Failed to create system directory nfs Oct 29 00:36:31.601904 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.603603 kernel: Failed to create system directory nfs Oct 29 00:36:31.603623 kernel: Failed to create system directory nfs Oct 29 00:36:31.603751 kernel: Failed to create system directory nfs Oct 29 00:36:31.565000 audit[2802]: AVC avc: denied { confidentiality } for pid=2802 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.565000 audit[2802]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac020ab50 a1=116324 a2=aaaab41ae028 a3=aaaabfdf3010 items=0 ppid=1032 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.619662 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 29 00:36:31.565000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.647871 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.647917 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.647936 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.647959 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.649076 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.649107 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.650813 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.650882 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.650898 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.651932 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.651996 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.653850 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.653876 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.654539 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.655731 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.655804 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.655852 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.656965 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.656997 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.658735 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.658770 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.660029 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.660059 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.660083 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.661713 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.661742 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.662905 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.662926 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.662965 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.664692 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.664723 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.665963 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.666056 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.666077 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.667717 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.667764 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.669002 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.669052 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.669068 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.670797 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.670832 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.670852 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.672014 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.672085 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.673684 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.673755 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.673774 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.674903 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.674955 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.676107 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.676144 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.677882 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.677933 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.677958 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.679046 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.679112 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.680966 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.681002 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.681016 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.682744 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.682772 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.682787 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.683876 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.683925 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.685041 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.685074 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.685656 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.686815 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.686866 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.687935 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.688020 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.688561 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.689686 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.689720 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.690827 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.690853 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.691928 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.691987 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.692589 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.693572 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.694644 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.694678 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.694708 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.695785 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.695820 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.696833 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.696887 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.697989 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.698036 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.699048 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.699136 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.700678 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.700728 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.700747 kernel: Failed to create system directory nfs4 Oct 29 00:36:31.639000 audit[2808]: AVC avc: denied { confidentiality } for pid=2808 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.800735 kernel: NFS: Registering the id_resolver key type Oct 29 00:36:31.800876 kernel: Key type id_resolver registered Oct 29 00:36:31.800894 kernel: Key type id_legacy registered Oct 29 00:36:31.639000 audit[2808]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff7f68a010 a1=19c744 a2=aaaaabf3e028 a3=aaaab7fa5010 items=0 ppid=1032 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.639000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.815617 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.815728 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.815746 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.816768 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.816816 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.817890 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.817913 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.818942 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.818986 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.820156 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.820226 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.821996 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.822092 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.822120 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.823601 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.823660 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.823690 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.824691 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.824751 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.825787 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.825844 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.826884 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.826954 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.828019 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.828081 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.811000 audit[2809]: AVC avc: denied { confidentiality } for pid=2809 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 00:36:31.829534 kernel: Failed to create system directory rpcgss Oct 29 00:36:31.811000 audit[2809]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff819d2010 a1=5eedc a2=aaaab52de028 a3=aaaabb2ba010 items=0 ppid=1032 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.811000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 29 00:36:31.841972 nfsidmap[2818]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 29 00:36:31.844745 nfsidmap[2821]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 29 00:36:31.861000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 00:36:31.861000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac79fced0 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.861000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 00:36:31.861000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 00:36:31.861000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac79fced0 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.861000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 00:36:31.861000 audit[1282]: AVC avc: denied { watch_reads } for pid=1282 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 00:36:31.861000 audit[1282]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac79fced0 a2=10 a3=0 items=0 ppid=1 pid=1282 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:31.861000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 29 00:36:31.861000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 00:36:31.861000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 00:36:31.861000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2523 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 29 00:36:32.108364 env[1217]: time="2025-10-29T00:36:32.108318337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e0b806b9-effb-43b7-9a6b-54705710f872,Namespace:default,Attempt:0,}" Oct 29 00:36:32.222107 systemd-networkd[1051]: cali5ec59c6bf6e: Link UP Oct 29 00:36:32.224278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 00:36:32.224351 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 29 00:36:32.224493 systemd-networkd[1051]: cali5ec59c6bf6e: Gained carrier Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.156 [INFO][2824] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.84-k8s-test--pod--1-eth0 default e0b806b9-effb-43b7-9a6b-54705710f872 1520 0 2025-10-29 00:36:17 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.84 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.157 [INFO][2824] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-eth0" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.181 [INFO][2840] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" HandleID="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Workload="10.0.0.84-k8s-test--pod--1-eth0" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.181 [INFO][2840] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" HandleID="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Workload="10.0.0.84-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c32c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.84", "pod":"test-pod-1", "timestamp":"2025-10-29 00:36:32.181198645 +0000 UTC"}, Hostname:"10.0.0.84", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.181 [INFO][2840] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.181 [INFO][2840] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.181 [INFO][2840] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.84' Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.191 [INFO][2840] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.195 [INFO][2840] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.201 [INFO][2840] ipam/ipam.go 511: Trying affinity for 192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.203 [INFO][2840] ipam/ipam.go 158: Attempting to load block cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.205 [INFO][2840] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.95.192/26 host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.205 [INFO][2840] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.95.192/26 handle="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.206 [INFO][2840] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425 Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.211 [INFO][2840] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.95.192/26 handle="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.217 [INFO][2840] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.95.196/26] block=192.168.95.192/26 handle="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.217 [INFO][2840] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.95.196/26] handle="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" host="10.0.0.84" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.217 [INFO][2840] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.217 [INFO][2840] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.95.196/26] IPv6=[] ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" HandleID="k8s-pod-network.fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Workload="10.0.0.84-k8s-test--pod--1-eth0" Oct 29 00:36:32.232896 env[1217]: 2025-10-29 00:36:32.218 [INFO][2824] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e0b806b9-effb-43b7-9a6b-54705710f872", ResourceVersion:"1520", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 36, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:32.233508 env[1217]: 2025-10-29 00:36:32.219 [INFO][2824] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.95.196/32] ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-eth0" Oct 29 00:36:32.233508 env[1217]: 2025-10-29 00:36:32.219 [INFO][2824] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-eth0" Oct 29 00:36:32.233508 env[1217]: 2025-10-29 00:36:32.224 [INFO][2824] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-eth0" Oct 29 00:36:32.233508 env[1217]: 2025-10-29 00:36:32.225 [INFO][2824] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.84-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e0b806b9-effb-43b7-9a6b-54705710f872", ResourceVersion:"1520", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 0, 36, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.84", ContainerID:"fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.95.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"6a:85:65:40:ef:c5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 00:36:32.233508 env[1217]: 2025-10-29 00:36:32.231 [INFO][2824] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.84-k8s-test--pod--1-eth0" Oct 29 00:36:32.245000 audit[2860]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2860 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 00:36:32.245000 audit[2860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffc10d1130 a2=0 a3=ffff81a5efa8 items=0 ppid=2118 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.245000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 00:36:32.247756 env[1217]: time="2025-10-29T00:36:32.247699281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 00:36:32.247903 env[1217]: time="2025-10-29T00:36:32.247879244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 00:36:32.248017 env[1217]: time="2025-10-29T00:36:32.247993086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 00:36:32.248288 env[1217]: time="2025-10-29T00:36:32.248258011Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425 pid=2864 runtime=io.containerd.runc.v2 Oct 29 00:36:32.259328 systemd[1]: Started cri-containerd-fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425.scope. Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit: BPF prog-id=120 op=LOAD Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664356461383634646331653430333738636432356233353033383163 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664356461383634646331653430333738636432356233353033383163 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit: BPF prog-id=121 op=LOAD Oct 29 00:36:32.276000 audit[2874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664356461383634646331653430333738636432356233353033383163 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit: BPF prog-id=122 op=LOAD Oct 29 00:36:32.276000 audit[2874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664356461383634646331653430333738636432356233353033383163 Oct 29 00:36:32.276000 audit: BPF prog-id=122 op=UNLOAD Oct 29 00:36:32.276000 audit: BPF prog-id=121 op=UNLOAD Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.276000 audit: BPF prog-id=123 op=LOAD Oct 29 00:36:32.276000 audit[2874]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664356461383634646331653430333738636432356233353033383163 Oct 29 00:36:32.277812 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 29 00:36:32.294914 env[1217]: time="2025-10-29T00:36:32.294870861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e0b806b9-effb-43b7-9a6b-54705710f872,Namespace:default,Attempt:0,} returns sandbox id \"fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425\"" Oct 29 00:36:32.296346 env[1217]: time="2025-10-29T00:36:32.296313527Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 29 00:36:32.324794 kubelet[1453]: E1029 00:36:32.324759 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:32.537033 env[1217]: time="2025-10-29T00:36:32.536906790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:32.538806 env[1217]: time="2025-10-29T00:36:32.538759582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:32.543193 env[1217]: time="2025-10-29T00:36:32.543157099Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Oct 29 00:36:32.543298 env[1217]: time="2025-10-29T00:36:32.542380325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:32.544076 env[1217]: time="2025-10-29T00:36:32.544032314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 00:36:32.546604 env[1217]: time="2025-10-29T00:36:32.546570718Z" level=info msg="CreateContainer within sandbox \"fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 29 00:36:32.561028 env[1217]: time="2025-10-29T00:36:32.560917168Z" level=info msg="CreateContainer within sandbox \"fd5da864dc1e40378cd25b350381cfc6ffb7d7558faa0d45c721a8fd7b1c1425\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d4042343b5aeb24e411e93d26fe4a40d552288bba219d0e1241ca9d3f5d3feff\"" Oct 29 00:36:32.561585 env[1217]: time="2025-10-29T00:36:32.561551299Z" level=info msg="StartContainer for \"d4042343b5aeb24e411e93d26fe4a40d552288bba219d0e1241ca9d3f5d3feff\"" Oct 29 00:36:32.579590 systemd[1]: Started cri-containerd-d4042343b5aeb24e411e93d26fe4a40d552288bba219d0e1241ca9d3f5d3feff.scope. Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.597000 audit: BPF prog-id=124 op=LOAD Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2864 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432333433623561656232346534313165393364323666653461 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2864 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432333433623561656232346534313165393364323666653461 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.598000 audit: BPF prog-id=125 op=LOAD Oct 29 00:36:32.598000 audit[2906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2864 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432333433623561656232346534313165393364323666653461 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit: BPF prog-id=126 op=LOAD Oct 29 00:36:32.599000 audit[2906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2864 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432333433623561656232346534313165393364323666653461 Oct 29 00:36:32.599000 audit: BPF prog-id=126 op=UNLOAD Oct 29 00:36:32.599000 audit: BPF prog-id=125 op=UNLOAD Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 00:36:32.599000 audit: BPF prog-id=127 op=LOAD Oct 29 00:36:32.599000 audit[2906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2864 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 00:36:32.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303432333433623561656232346534313165393364323666653461 Oct 29 00:36:32.615161 env[1217]: time="2025-10-29T00:36:32.615120790Z" level=info msg="StartContainer for \"d4042343b5aeb24e411e93d26fe4a40d552288bba219d0e1241ca9d3f5d3feff\" returns successfully" Oct 29 00:36:33.325030 kubelet[1453]: E1029 00:36:33.324970 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:33.546394 kubelet[1453]: I1029 00:36:33.546259 1453 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.297755727 podStartE2EDuration="16.546240288s" podCreationTimestamp="2025-10-29 00:36:17 +0000 UTC" firstStartedPulling="2025-10-29 00:36:32.295847038 +0000 UTC m=+49.851722739" lastFinishedPulling="2025-10-29 00:36:32.544331639 +0000 UTC m=+50.100207300" observedRunningTime="2025-10-29 00:36:33.546164887 +0000 UTC m=+51.102040588" watchObservedRunningTime="2025-10-29 00:36:33.546240288 +0000 UTC m=+51.102115989" Oct 29 00:36:33.613705 systemd-networkd[1051]: cali5ec59c6bf6e: Gained IPv6LL Oct 29 00:36:34.325418 kubelet[1453]: E1029 00:36:34.325364 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:34.403763 systemd[1]: run-containerd-runc-k8s.io-4b999a8243fa59286b082644d7f47e3de4fd595db2299dcf92489d96e1f066cf-runc.MZpPo9.mount: Deactivated successfully. Oct 29 00:36:35.326133 kubelet[1453]: E1029 00:36:35.326075 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:36.326694 kubelet[1453]: E1029 00:36:36.326660 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:37.327779 kubelet[1453]: E1029 00:36:37.327743 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:37.429483 kubelet[1453]: E1029 00:36:37.429424 1453 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-fg5pv" podUID="259fc121-6a1d-4571-8bc6-9cfbdb3834ad" Oct 29 00:36:38.329217 kubelet[1453]: E1029 00:36:38.329161 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 29 00:36:39.329971 kubelet[1453]: E1029 00:36:39.329913 1453 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"