Oct 31 01:18:31.865209 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 01:18:31.865228 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:18:31.865236 kernel: BIOS-provided physical RAM map: Oct 31 01:18:31.865242 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 31 01:18:31.865247 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 31 01:18:31.865252 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 31 01:18:31.865259 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Oct 31 01:18:31.865264 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Oct 31 01:18:31.865271 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 31 01:18:31.865276 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 31 01:18:31.865282 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 31 01:18:31.865287 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 31 01:18:31.865293 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Oct 31 01:18:31.865298 kernel: NX (Execute Disable) protection: active Oct 31 01:18:31.865307 kernel: SMBIOS 2.8 present. Oct 31 01:18:31.865313 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Oct 31 01:18:31.865319 kernel: Hypervisor detected: KVM Oct 31 01:18:31.865324 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 31 01:18:31.865330 kernel: kvm-clock: cpu 0, msr 9c1a0001, primary cpu clock Oct 31 01:18:31.865336 kernel: kvm-clock: using sched offset of 2772126727 cycles Oct 31 01:18:31.865342 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 31 01:18:31.865359 kernel: tsc: Detected 2794.748 MHz processor Oct 31 01:18:31.865366 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 01:18:31.865373 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 01:18:31.865379 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Oct 31 01:18:31.865386 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 01:18:31.865392 kernel: Using GB pages for direct mapping Oct 31 01:18:31.865398 kernel: ACPI: Early table checksum verification disabled Oct 31 01:18:31.865404 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Oct 31 01:18:31.865410 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:18:31.865416 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:18:31.865422 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:18:31.865429 kernel: ACPI: FACS 0x000000009CFE0000 000040 Oct 31 01:18:31.865435 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:18:31.865441 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:18:31.865447 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:18:31.865453 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:18:31.865459 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Oct 31 01:18:31.865465 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Oct 31 01:18:31.865471 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Oct 31 01:18:31.865480 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Oct 31 01:18:31.865487 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Oct 31 01:18:31.865493 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Oct 31 01:18:31.865500 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Oct 31 01:18:31.865506 kernel: No NUMA configuration found Oct 31 01:18:31.865512 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Oct 31 01:18:31.865520 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Oct 31 01:18:31.865526 kernel: Zone ranges: Oct 31 01:18:31.865533 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 01:18:31.865539 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Oct 31 01:18:31.865546 kernel: Normal empty Oct 31 01:18:31.865552 kernel: Movable zone start for each node Oct 31 01:18:31.865558 kernel: Early memory node ranges Oct 31 01:18:31.865565 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 31 01:18:31.865571 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Oct 31 01:18:31.865579 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Oct 31 01:18:31.865585 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 01:18:31.865591 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 31 01:18:31.865598 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Oct 31 01:18:31.865604 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 31 01:18:31.865611 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 31 01:18:31.865617 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 31 01:18:31.865623 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 31 01:18:31.865630 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 31 01:18:31.865636 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 31 01:18:31.865644 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 31 01:18:31.865650 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 31 01:18:31.865657 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 01:18:31.865663 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 31 01:18:31.865669 kernel: TSC deadline timer available Oct 31 01:18:31.865676 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Oct 31 01:18:31.865682 kernel: kvm-guest: KVM setup pv remote TLB flush Oct 31 01:18:31.865688 kernel: kvm-guest: setup PV sched yield Oct 31 01:18:31.865695 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 31 01:18:31.865702 kernel: Booting paravirtualized kernel on KVM Oct 31 01:18:31.865717 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 01:18:31.865724 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Oct 31 01:18:31.865730 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Oct 31 01:18:31.865737 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Oct 31 01:18:31.865743 kernel: pcpu-alloc: [0] 0 1 2 3 Oct 31 01:18:31.865749 kernel: kvm-guest: setup async PF for cpu 0 Oct 31 01:18:31.865756 kernel: kvm-guest: stealtime: cpu 0, msr 9cc1c0c0 Oct 31 01:18:31.865762 kernel: kvm-guest: PV spinlocks enabled Oct 31 01:18:31.865771 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 31 01:18:31.865777 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Oct 31 01:18:31.865784 kernel: Policy zone: DMA32 Oct 31 01:18:31.865791 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:18:31.865798 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 01:18:31.865805 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 31 01:18:31.865811 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 01:18:31.865818 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 01:18:31.865826 kernel: Memory: 2436696K/2571752K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 134796K reserved, 0K cma-reserved) Oct 31 01:18:31.865832 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 31 01:18:31.865839 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 01:18:31.865845 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 01:18:31.865852 kernel: rcu: Hierarchical RCU implementation. Oct 31 01:18:31.865858 kernel: rcu: RCU event tracing is enabled. Oct 31 01:18:31.865865 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 31 01:18:31.865872 kernel: Rude variant of Tasks RCU enabled. Oct 31 01:18:31.865878 kernel: Tracing variant of Tasks RCU enabled. Oct 31 01:18:31.865886 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 01:18:31.865892 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 31 01:18:31.865899 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Oct 31 01:18:31.865905 kernel: random: crng init done Oct 31 01:18:31.865912 kernel: Console: colour VGA+ 80x25 Oct 31 01:18:31.865918 kernel: printk: console [ttyS0] enabled Oct 31 01:18:31.865924 kernel: ACPI: Core revision 20210730 Oct 31 01:18:31.865931 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Oct 31 01:18:31.865938 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 01:18:31.865945 kernel: x2apic enabled Oct 31 01:18:31.865951 kernel: Switched APIC routing to physical x2apic. Oct 31 01:18:31.865958 kernel: kvm-guest: setup PV IPIs Oct 31 01:18:31.865964 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 31 01:18:31.865971 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 31 01:18:31.865977 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Oct 31 01:18:31.865984 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 31 01:18:31.865990 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 31 01:18:31.865997 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 31 01:18:31.866009 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 01:18:31.866016 kernel: Spectre V2 : Mitigation: Retpolines Oct 31 01:18:31.866022 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 31 01:18:31.866031 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 31 01:18:31.866037 kernel: active return thunk: retbleed_return_thunk Oct 31 01:18:31.866044 kernel: RETBleed: Mitigation: untrained return thunk Oct 31 01:18:31.866052 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 01:18:31.866060 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 01:18:31.866068 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 01:18:31.866077 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 01:18:31.866085 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 01:18:31.866091 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 01:18:31.866098 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 31 01:18:31.866105 kernel: Freeing SMP alternatives memory: 32K Oct 31 01:18:31.866112 kernel: pid_max: default: 32768 minimum: 301 Oct 31 01:18:31.866118 kernel: LSM: Security Framework initializing Oct 31 01:18:31.866126 kernel: SELinux: Initializing. Oct 31 01:18:31.866133 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 01:18:31.866140 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 01:18:31.866147 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 31 01:18:31.866154 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 31 01:18:31.866160 kernel: ... version: 0 Oct 31 01:18:31.866167 kernel: ... bit width: 48 Oct 31 01:18:31.866174 kernel: ... generic registers: 6 Oct 31 01:18:31.866180 kernel: ... value mask: 0000ffffffffffff Oct 31 01:18:31.866188 kernel: ... max period: 00007fffffffffff Oct 31 01:18:31.866195 kernel: ... fixed-purpose events: 0 Oct 31 01:18:31.866202 kernel: ... event mask: 000000000000003f Oct 31 01:18:31.866208 kernel: signal: max sigframe size: 1776 Oct 31 01:18:31.866215 kernel: rcu: Hierarchical SRCU implementation. Oct 31 01:18:31.866222 kernel: smp: Bringing up secondary CPUs ... Oct 31 01:18:31.866228 kernel: x86: Booting SMP configuration: Oct 31 01:18:31.866235 kernel: .... node #0, CPUs: #1 Oct 31 01:18:31.866242 kernel: kvm-clock: cpu 1, msr 9c1a0041, secondary cpu clock Oct 31 01:18:31.866249 kernel: kvm-guest: setup async PF for cpu 1 Oct 31 01:18:31.866257 kernel: kvm-guest: stealtime: cpu 1, msr 9cc9c0c0 Oct 31 01:18:31.866263 kernel: #2 Oct 31 01:18:31.866270 kernel: kvm-clock: cpu 2, msr 9c1a0081, secondary cpu clock Oct 31 01:18:31.866277 kernel: kvm-guest: setup async PF for cpu 2 Oct 31 01:18:31.866283 kernel: kvm-guest: stealtime: cpu 2, msr 9cd1c0c0 Oct 31 01:18:31.866290 kernel: #3 Oct 31 01:18:31.866297 kernel: kvm-clock: cpu 3, msr 9c1a00c1, secondary cpu clock Oct 31 01:18:31.866303 kernel: kvm-guest: setup async PF for cpu 3 Oct 31 01:18:31.866310 kernel: kvm-guest: stealtime: cpu 3, msr 9cd9c0c0 Oct 31 01:18:31.866318 kernel: smp: Brought up 1 node, 4 CPUs Oct 31 01:18:31.866324 kernel: smpboot: Max logical packages: 1 Oct 31 01:18:31.866336 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Oct 31 01:18:31.866343 kernel: devtmpfs: initialized Oct 31 01:18:31.866360 kernel: x86/mm: Memory block size: 128MB Oct 31 01:18:31.866367 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 01:18:31.866373 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 31 01:18:31.866380 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 01:18:31.866387 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 01:18:31.866395 kernel: audit: initializing netlink subsys (disabled) Oct 31 01:18:31.866402 kernel: audit: type=2000 audit(1761873511.180:1): state=initialized audit_enabled=0 res=1 Oct 31 01:18:31.866409 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 01:18:31.866416 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 01:18:31.866422 kernel: cpuidle: using governor menu Oct 31 01:18:31.866429 kernel: ACPI: bus type PCI registered Oct 31 01:18:31.866436 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 01:18:31.866443 kernel: dca service started, version 1.12.1 Oct 31 01:18:31.866450 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 31 01:18:31.866458 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 31 01:18:31.866465 kernel: PCI: Using configuration type 1 for base access Oct 31 01:18:31.866472 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 01:18:31.866479 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 01:18:31.866486 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 01:18:31.866492 kernel: ACPI: Added _OSI(Module Device) Oct 31 01:18:31.866499 kernel: ACPI: Added _OSI(Processor Device) Oct 31 01:18:31.866506 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 01:18:31.866512 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 01:18:31.866520 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 01:18:31.866527 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 01:18:31.866534 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 01:18:31.866541 kernel: ACPI: Interpreter enabled Oct 31 01:18:31.866547 kernel: ACPI: PM: (supports S0 S3 S5) Oct 31 01:18:31.866554 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 01:18:31.866561 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 01:18:31.866568 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 31 01:18:31.866574 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 31 01:18:31.866754 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 01:18:31.867477 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Oct 31 01:18:31.867589 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Oct 31 01:18:31.867600 kernel: PCI host bridge to bus 0000:00 Oct 31 01:18:31.867680 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 01:18:31.867763 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 31 01:18:31.867836 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 01:18:31.867900 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Oct 31 01:18:31.867964 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 01:18:31.868030 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Oct 31 01:18:31.868095 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 31 01:18:31.868180 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 31 01:18:31.868262 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Oct 31 01:18:31.868339 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Oct 31 01:18:31.868431 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Oct 31 01:18:31.868503 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Oct 31 01:18:31.868576 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 01:18:31.868656 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Oct 31 01:18:31.868741 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Oct 31 01:18:31.868819 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Oct 31 01:18:31.868892 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Oct 31 01:18:31.868972 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Oct 31 01:18:31.869046 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Oct 31 01:18:31.869118 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Oct 31 01:18:31.869189 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Oct 31 01:18:31.869285 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Oct 31 01:18:31.869377 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Oct 31 01:18:31.869451 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Oct 31 01:18:31.869524 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Oct 31 01:18:31.869600 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Oct 31 01:18:31.873460 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 31 01:18:31.873539 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 31 01:18:31.873614 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 31 01:18:31.873687 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Oct 31 01:18:31.873779 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Oct 31 01:18:31.873894 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 31 01:18:31.873963 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 31 01:18:31.873973 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 31 01:18:31.873981 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 31 01:18:31.873988 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 01:18:31.873995 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 31 01:18:31.874005 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 31 01:18:31.874012 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 31 01:18:31.874019 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 31 01:18:31.874026 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 31 01:18:31.874039 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 31 01:18:31.874046 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 31 01:18:31.874053 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 31 01:18:31.874060 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 31 01:18:31.874067 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 31 01:18:31.874076 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 31 01:18:31.874083 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 31 01:18:31.874091 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 31 01:18:31.874098 kernel: iommu: Default domain type: Translated Oct 31 01:18:31.874105 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 01:18:31.874175 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 31 01:18:31.874243 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 01:18:31.874309 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 31 01:18:31.874321 kernel: vgaarb: loaded Oct 31 01:18:31.874329 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 01:18:31.874336 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 01:18:31.874343 kernel: PTP clock support registered Oct 31 01:18:31.874362 kernel: PCI: Using ACPI for IRQ routing Oct 31 01:18:31.874369 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 01:18:31.874377 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 31 01:18:31.874384 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Oct 31 01:18:31.874391 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Oct 31 01:18:31.874400 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Oct 31 01:18:31.874407 kernel: clocksource: Switched to clocksource kvm-clock Oct 31 01:18:31.874414 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 01:18:31.874421 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 01:18:31.874429 kernel: pnp: PnP ACPI init Oct 31 01:18:31.874505 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 31 01:18:31.874516 kernel: pnp: PnP ACPI: found 6 devices Oct 31 01:18:31.874523 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 01:18:31.874533 kernel: NET: Registered PF_INET protocol family Oct 31 01:18:31.874540 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 31 01:18:31.874547 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 31 01:18:31.874554 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 01:18:31.874561 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 01:18:31.874568 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 31 01:18:31.874575 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 31 01:18:31.874582 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 01:18:31.874590 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 01:18:31.874598 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 01:18:31.874605 kernel: NET: Registered PF_XDP protocol family Oct 31 01:18:31.874668 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 31 01:18:31.874744 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 31 01:18:31.874812 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 31 01:18:31.874871 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Oct 31 01:18:31.874929 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 31 01:18:31.874988 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Oct 31 01:18:31.875000 kernel: PCI: CLS 0 bytes, default 64 Oct 31 01:18:31.875008 kernel: Initialise system trusted keyrings Oct 31 01:18:31.875015 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 31 01:18:31.875022 kernel: Key type asymmetric registered Oct 31 01:18:31.875029 kernel: Asymmetric key parser 'x509' registered Oct 31 01:18:31.875036 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 01:18:31.875043 kernel: io scheduler mq-deadline registered Oct 31 01:18:31.875050 kernel: io scheduler kyber registered Oct 31 01:18:31.875058 kernel: io scheduler bfq registered Oct 31 01:18:31.875065 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 01:18:31.875076 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 31 01:18:31.875083 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 31 01:18:31.875092 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 31 01:18:31.875100 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 01:18:31.875106 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 01:18:31.875114 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 31 01:18:31.875121 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 01:18:31.875128 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 01:18:31.875197 kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 31 01:18:31.875210 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 01:18:31.875271 kernel: rtc_cmos 00:04: registered as rtc0 Oct 31 01:18:31.875332 kernel: rtc_cmos 00:04: setting system clock to 2025-10-31T01:18:31 UTC (1761873511) Oct 31 01:18:31.875409 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Oct 31 01:18:31.875419 kernel: NET: Registered PF_INET6 protocol family Oct 31 01:18:31.875426 kernel: Segment Routing with IPv6 Oct 31 01:18:31.875433 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 01:18:31.875440 kernel: NET: Registered PF_PACKET protocol family Oct 31 01:18:31.875450 kernel: Key type dns_resolver registered Oct 31 01:18:31.875457 kernel: IPI shorthand broadcast: enabled Oct 31 01:18:31.875464 kernel: sched_clock: Marking stable (525826569, 183235354)->(808625882, -99563959) Oct 31 01:18:31.875471 kernel: registered taskstats version 1 Oct 31 01:18:31.875478 kernel: Loading compiled-in X.509 certificates Oct 31 01:18:31.875485 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 01:18:31.875492 kernel: Key type .fscrypt registered Oct 31 01:18:31.875499 kernel: Key type fscrypt-provisioning registered Oct 31 01:18:31.875506 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 01:18:31.875515 kernel: ima: Allocated hash algorithm: sha1 Oct 31 01:18:31.875522 kernel: ima: No architecture policies found Oct 31 01:18:31.875529 kernel: clk: Disabling unused clocks Oct 31 01:18:31.875536 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 01:18:31.875543 kernel: Write protecting the kernel read-only data: 28672k Oct 31 01:18:31.875550 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 01:18:31.875558 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 01:18:31.875565 kernel: Run /init as init process Oct 31 01:18:31.875574 kernel: with arguments: Oct 31 01:18:31.875581 kernel: /init Oct 31 01:18:31.875588 kernel: with environment: Oct 31 01:18:31.875594 kernel: HOME=/ Oct 31 01:18:31.875601 kernel: TERM=linux Oct 31 01:18:31.875608 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 01:18:31.875618 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:18:31.875628 systemd[1]: Detected virtualization kvm. Oct 31 01:18:31.875637 systemd[1]: Detected architecture x86-64. Oct 31 01:18:31.875644 systemd[1]: Running in initrd. Oct 31 01:18:31.875651 systemd[1]: No hostname configured, using default hostname. Oct 31 01:18:31.875659 systemd[1]: Hostname set to . Oct 31 01:18:31.875666 systemd[1]: Initializing machine ID from VM UUID. Oct 31 01:18:31.875674 systemd[1]: Queued start job for default target initrd.target. Oct 31 01:18:31.875681 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:18:31.875688 systemd[1]: Reached target cryptsetup.target. Oct 31 01:18:31.875696 systemd[1]: Reached target paths.target. Oct 31 01:18:31.875705 systemd[1]: Reached target slices.target. Oct 31 01:18:31.875731 systemd[1]: Reached target swap.target. Oct 31 01:18:31.875744 systemd[1]: Reached target timers.target. Oct 31 01:18:31.875754 systemd[1]: Listening on iscsid.socket. Oct 31 01:18:31.875764 systemd[1]: Listening on iscsiuio.socket. Oct 31 01:18:31.875775 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 01:18:31.875785 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 01:18:31.875795 systemd[1]: Listening on systemd-journald.socket. Oct 31 01:18:31.875805 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:18:31.875814 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:18:31.875822 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:18:31.875830 systemd[1]: Reached target sockets.target. Oct 31 01:18:31.875837 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:18:31.875847 systemd[1]: Finished network-cleanup.service. Oct 31 01:18:31.875856 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 01:18:31.875864 systemd[1]: Starting systemd-journald.service... Oct 31 01:18:31.875871 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:18:31.875879 systemd[1]: Starting systemd-resolved.service... Oct 31 01:18:31.875887 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 01:18:31.875904 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:18:31.875925 kernel: audit: type=1130 audit(1761873511.866:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.875933 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 01:18:31.875946 systemd-journald[198]: Journal started Oct 31 01:18:31.875992 systemd-journald[198]: Runtime Journal (/run/log/journal/f83a68c891c746d598a70b7758d6fb30) is 6.0M, max 48.5M, 42.5M free. Oct 31 01:18:31.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.871509 systemd-modules-load[199]: Inserted module 'overlay' Oct 31 01:18:31.881382 systemd[1]: Started systemd-journald.service. Oct 31 01:18:31.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.883364 kernel: audit: type=1130 audit(1761873511.880:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.890292 systemd-resolved[200]: Positive Trust Anchors: Oct 31 01:18:31.965229 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 01:18:31.965250 kernel: Bridge firewalling registered Oct 31 01:18:31.965260 kernel: SCSI subsystem initialized Oct 31 01:18:31.965268 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 01:18:31.965278 kernel: device-mapper: uevent: version 1.0.3 Oct 31 01:18:31.965287 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 01:18:31.965296 kernel: audit: type=1130 audit(1761873511.963:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.890305 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:18:31.890331 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:18:31.985411 kernel: audit: type=1130 audit(1761873511.970:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.985430 kernel: audit: type=1130 audit(1761873511.974:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.892532 systemd-resolved[200]: Defaulting to hostname 'linux'. Oct 31 01:18:31.907061 systemd-modules-load[199]: Inserted module 'br_netfilter' Oct 31 01:18:32.002730 kernel: audit: type=1130 audit(1761873511.994:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:31.934646 systemd-modules-load[199]: Inserted module 'dm_multipath' Oct 31 01:18:31.963700 systemd[1]: Started systemd-resolved.service. Oct 31 01:18:31.971452 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:18:31.974942 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 01:18:31.994734 systemd[1]: Reached target nss-lookup.target. Oct 31 01:18:31.997794 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 01:18:32.003192 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:18:32.003832 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 01:18:32.017088 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 01:18:32.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.026378 kernel: audit: type=1130 audit(1761873512.017:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.018451 systemd[1]: Starting dracut-cmdline.service... Oct 31 01:18:32.039907 kernel: audit: type=1130 audit(1761873512.026:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.039922 kernel: audit: type=1130 audit(1761873512.033:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.039979 dracut-cmdline[219]: dracut-dracut-053 Oct 31 01:18:32.039979 dracut-cmdline[219]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 31 01:18:32.039979 dracut-cmdline[219]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:18:32.026450 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 01:18:32.028390 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:18:32.085382 kernel: Loading iSCSI transport class v2.0-870. Oct 31 01:18:32.102384 kernel: iscsi: registered transport (tcp) Oct 31 01:18:32.123380 kernel: iscsi: registered transport (qla4xxx) Oct 31 01:18:32.123407 kernel: QLogic iSCSI HBA Driver Oct 31 01:18:32.152185 systemd[1]: Finished dracut-cmdline.service. Oct 31 01:18:32.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.153637 systemd[1]: Starting dracut-pre-udev.service... Oct 31 01:18:32.199374 kernel: raid6: avx2x4 gen() 30011 MB/s Oct 31 01:18:32.217368 kernel: raid6: avx2x4 xor() 7478 MB/s Oct 31 01:18:32.235367 kernel: raid6: avx2x2 gen() 31933 MB/s Oct 31 01:18:32.253367 kernel: raid6: avx2x2 xor() 19125 MB/s Oct 31 01:18:32.271367 kernel: raid6: avx2x1 gen() 26321 MB/s Oct 31 01:18:32.289367 kernel: raid6: avx2x1 xor() 15302 MB/s Oct 31 01:18:32.307366 kernel: raid6: sse2x4 gen() 14701 MB/s Oct 31 01:18:32.325368 kernel: raid6: sse2x4 xor() 7010 MB/s Oct 31 01:18:32.343369 kernel: raid6: sse2x2 gen() 16168 MB/s Oct 31 01:18:32.361370 kernel: raid6: sse2x2 xor() 9804 MB/s Oct 31 01:18:32.379368 kernel: raid6: sse2x1 gen() 12246 MB/s Oct 31 01:18:32.397797 kernel: raid6: sse2x1 xor() 7783 MB/s Oct 31 01:18:32.397812 kernel: raid6: using algorithm avx2x2 gen() 31933 MB/s Oct 31 01:18:32.397822 kernel: raid6: .... xor() 19125 MB/s, rmw enabled Oct 31 01:18:32.399048 kernel: raid6: using avx2x2 recovery algorithm Oct 31 01:18:32.412372 kernel: xor: automatically using best checksumming function avx Oct 31 01:18:32.502389 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 01:18:32.510207 systemd[1]: Finished dracut-pre-udev.service. Oct 31 01:18:32.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.512000 audit: BPF prog-id=7 op=LOAD Oct 31 01:18:32.512000 audit: BPF prog-id=8 op=LOAD Oct 31 01:18:32.513170 systemd[1]: Starting systemd-udevd.service... Oct 31 01:18:32.526040 systemd-udevd[399]: Using default interface naming scheme 'v252'. Oct 31 01:18:32.530154 systemd[1]: Started systemd-udevd.service. Oct 31 01:18:32.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.532150 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 01:18:32.543833 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Oct 31 01:18:32.566389 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 01:18:32.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.567675 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:18:32.599464 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:18:32.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:32.631375 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 01:18:32.643371 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Oct 31 01:18:32.656583 kernel: AVX2 version of gcm_enc/dec engaged. Oct 31 01:18:32.656595 kernel: AES CTR mode by8 optimization enabled Oct 31 01:18:32.656604 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 31 01:18:32.656616 kernel: GPT:9289727 != 19775487 Oct 31 01:18:32.656624 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 31 01:18:32.656641 kernel: GPT:9289727 != 19775487 Oct 31 01:18:32.656649 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 31 01:18:32.656657 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:18:32.662375 kernel: libata version 3.00 loaded. Oct 31 01:18:32.672375 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (441) Oct 31 01:18:32.676379 kernel: ahci 0000:00:1f.2: version 3.0 Oct 31 01:18:32.679909 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 31 01:18:32.679925 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 31 01:18:32.680009 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 31 01:18:32.680083 kernel: scsi host0: ahci Oct 31 01:18:32.680185 kernel: scsi host1: ahci Oct 31 01:18:32.680267 kernel: scsi host2: ahci Oct 31 01:18:32.680361 kernel: scsi host3: ahci Oct 31 01:18:32.680469 kernel: scsi host4: ahci Oct 31 01:18:32.680563 kernel: scsi host5: ahci Oct 31 01:18:32.680655 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Oct 31 01:18:32.680665 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Oct 31 01:18:32.680674 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Oct 31 01:18:32.680682 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Oct 31 01:18:32.680700 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Oct 31 01:18:32.680709 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Oct 31 01:18:32.683712 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 01:18:32.762095 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 01:18:32.762764 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 01:18:32.772183 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 01:18:32.775763 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:18:32.779240 systemd[1]: Starting disk-uuid.service... Oct 31 01:18:32.787053 disk-uuid[523]: Primary Header is updated. Oct 31 01:18:32.787053 disk-uuid[523]: Secondary Entries is updated. Oct 31 01:18:32.787053 disk-uuid[523]: Secondary Header is updated. Oct 31 01:18:32.794221 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:18:32.794235 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:18:32.991851 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 31 01:18:32.991914 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 31 01:18:32.991932 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 31 01:18:32.992374 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 31 01:18:32.995381 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Oct 31 01:18:32.995412 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 31 01:18:32.997379 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 31 01:18:32.999254 kernel: ata3.00: applying bridge limits Oct 31 01:18:33.001379 kernel: ata3.00: configured for UDMA/100 Oct 31 01:18:33.001390 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 31 01:18:33.033673 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 31 01:18:33.050962 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 31 01:18:33.050975 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 31 01:18:33.797369 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:18:33.797575 disk-uuid[524]: The operation has completed successfully. Oct 31 01:18:33.817125 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 01:18:33.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:33.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:33.817201 systemd[1]: Finished disk-uuid.service. Oct 31 01:18:33.823802 systemd[1]: Starting verity-setup.service... Oct 31 01:18:33.837371 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Oct 31 01:18:33.854063 systemd[1]: Found device dev-mapper-usr.device. Oct 31 01:18:33.855912 systemd[1]: Mounting sysusr-usr.mount... Oct 31 01:18:33.857895 systemd[1]: Finished verity-setup.service. Oct 31 01:18:33.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:33.915226 systemd[1]: Mounted sysusr-usr.mount. Oct 31 01:18:33.917370 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 01:18:33.915960 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 31 01:18:33.917391 systemd[1]: Starting ignition-setup.service... Oct 31 01:18:33.920990 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 01:18:33.933803 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:18:33.933829 kernel: BTRFS info (device vda6): using free space tree Oct 31 01:18:33.933838 kernel: BTRFS info (device vda6): has skinny extents Oct 31 01:18:33.941824 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 01:18:33.949509 systemd[1]: Finished ignition-setup.service. Oct 31 01:18:33.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:33.951466 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 01:18:33.974995 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 01:18:33.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:33.977000 audit: BPF prog-id=9 op=LOAD Oct 31 01:18:33.978192 systemd[1]: Starting systemd-networkd.service... Oct 31 01:18:33.995408 ignition[661]: Ignition 2.14.0 Oct 31 01:18:33.996217 ignition[661]: Stage: fetch-offline Oct 31 01:18:33.996261 ignition[661]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:18:33.996269 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:18:33.999655 systemd-networkd[714]: lo: Link UP Oct 31 01:18:34.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:33.996375 ignition[661]: parsed url from cmdline: "" Oct 31 01:18:33.999660 systemd-networkd[714]: lo: Gained carrier Oct 31 01:18:33.996378 ignition[661]: no config URL provided Oct 31 01:18:34.000256 systemd-networkd[714]: Enumeration completed Oct 31 01:18:34.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:33.996382 ignition[661]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 01:18:34.000336 systemd[1]: Started systemd-networkd.service. Oct 31 01:18:33.996388 ignition[661]: no config at "/usr/lib/ignition/user.ign" Oct 31 01:18:34.000680 systemd-networkd[714]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 01:18:33.996408 ignition[661]: op(1): [started] loading QEMU firmware config module Oct 31 01:18:34.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.002128 systemd-networkd[714]: eth0: Link UP Oct 31 01:18:33.996412 ignition[661]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 31 01:18:34.027764 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:18:34.027764 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 31 01:18:34.027764 iscsid[722]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 01:18:34.027764 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 01:18:34.027764 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 01:18:34.027764 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:18:34.027764 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 01:18:34.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.002131 systemd-networkd[714]: eth0: Gained carrier Oct 31 01:18:33.999049 ignition[661]: op(1): [finished] loading QEMU firmware config module Oct 31 01:18:34.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.003391 systemd[1]: Reached target network.target. Oct 31 01:18:34.000294 ignition[661]: parsing config with SHA512: e14dcb2974ba9a91b0bbbb3532549c9e810fa3740a0074b3075d3d07d615dbbb29ecfca9facfc4eba1cdbd3508d36dabc6da433b852b19fe422b77ff5ba53612 Oct 31 01:18:34.005552 systemd[1]: Starting iscsiuio.service... Oct 31 01:18:34.007481 ignition[661]: fetch-offline: fetch-offline passed Oct 31 01:18:34.007125 unknown[661]: fetched base config from "system" Oct 31 01:18:34.007545 ignition[661]: Ignition finished successfully Oct 31 01:18:34.007131 unknown[661]: fetched user config from "qemu" Oct 31 01:18:34.024177 ignition[721]: Ignition 2.14.0 Oct 31 01:18:34.009196 systemd[1]: Started iscsiuio.service. Oct 31 01:18:34.024185 ignition[721]: Stage: kargs Oct 31 01:18:34.011043 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 01:18:34.024283 ignition[721]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:18:34.083248 systemd-fsck[751]: ROOT: clean, 637/553520 files, 56032/553472 blocks Oct 31 01:18:34.013903 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 31 01:18:34.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.024293 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:18:34.096443 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 01:18:34.014614 systemd[1]: Starting ignition-kargs.service... Oct 31 01:18:34.025159 ignition[721]: kargs: kargs passed Oct 31 01:18:34.017284 systemd[1]: Starting iscsid.service... Oct 31 01:18:34.025199 ignition[721]: Ignition finished successfully Oct 31 01:18:34.017492 systemd-networkd[714]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 01:18:34.057064 ignition[738]: Ignition 2.14.0 Oct 31 01:18:34.021705 systemd[1]: Started iscsid.service. Oct 31 01:18:34.057069 ignition[738]: Stage: disks Oct 31 01:18:34.025040 systemd[1]: Starting dracut-initqueue.service... Oct 31 01:18:34.114247 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 01:18:34.057149 ignition[738]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:18:34.030093 systemd[1]: Finished ignition-kargs.service. Oct 31 01:18:34.118911 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Oct 31 01:18:34.057157 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:18:34.036923 systemd[1]: Finished dracut-initqueue.service. Oct 31 01:18:34.124142 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 01:18:34.057837 ignition[738]: disks: disks passed Oct 31 01:18:34.041880 systemd[1]: Reached target remote-fs-pre.target. Oct 31 01:18:34.129271 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 01:18:34.057867 ignition[738]: Ignition finished successfully Oct 31 01:18:34.044674 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:18:34.047828 systemd[1]: Reached target remote-fs.target. Oct 31 01:18:34.048950 systemd[1]: Starting dracut-pre-mount.service... Oct 31 01:18:34.050265 systemd[1]: Starting ignition-disks.service... Oct 31 01:18:34.056770 systemd[1]: Finished dracut-pre-mount.service. Oct 31 01:18:34.058549 systemd[1]: Finished ignition-disks.service. Oct 31 01:18:34.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.061062 systemd[1]: Reached target initrd-root-device.target. Oct 31 01:18:34.062466 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:18:34.148178 bash[802]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 01:18:34.063790 systemd[1]: Reached target local-fs.target. Oct 31 01:18:34.066169 systemd[1]: Reached target sysinit.target. Oct 31 01:18:34.067409 systemd[1]: Reached target basic.target. Oct 31 01:18:34.069182 systemd[1]: Starting systemd-fsck-root.service... Oct 31 01:18:34.084873 systemd[1]: Finished systemd-fsck-root.service. Oct 31 01:18:34.087585 systemd[1]: Mounting sysroot.mount... Oct 31 01:18:34.158440 ignition[804]: INFO : Ignition 2.14.0 Oct 31 01:18:34.158440 ignition[804]: INFO : Stage: mount Oct 31 01:18:34.158440 ignition[804]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:18:34.158440 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:18:34.158440 ignition[804]: INFO : mount: mount passed Oct 31 01:18:34.158440 ignition[804]: INFO : Ignition finished successfully Oct 31 01:18:34.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.095029 systemd[1]: Mounted sysroot.mount. Oct 31 01:18:34.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:34.096478 systemd[1]: Reached target initrd-root-fs.target. Oct 31 01:18:34.098482 systemd[1]: Mounting sysroot-usr.mount... Oct 31 01:18:34.100373 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 01:18:34.100399 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 01:18:34.100417 systemd[1]: Reached target ignition-diskful.target. Oct 31 01:18:34.103141 systemd[1]: Mounted sysroot-usr.mount. Oct 31 01:18:34.105282 systemd[1]: Starting initrd-setup-root.service... Oct 31 01:18:34.138689 systemd[1]: Finished initrd-setup-root.service. Oct 31 01:18:34.140998 systemd[1]: Starting ignition-mount.service... Oct 31 01:18:34.143465 systemd[1]: Starting sysroot-boot.service... Oct 31 01:18:34.157391 systemd[1]: Finished ignition-mount.service. Oct 31 01:18:34.165216 systemd[1]: Finished sysroot-boot.service. Oct 31 01:18:34.865499 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 01:18:34.871371 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (812) Oct 31 01:18:34.874729 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:18:34.874750 kernel: BTRFS info (device vda6): using free space tree Oct 31 01:18:34.874760 kernel: BTRFS info (device vda6): has skinny extents Oct 31 01:18:34.878821 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 01:18:34.879987 systemd[1]: Starting ignition-files.service... Oct 31 01:18:34.905924 ignition[832]: INFO : Ignition 2.14.0 Oct 31 01:18:34.905924 ignition[832]: INFO : Stage: files Oct 31 01:18:34.908775 ignition[832]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:18:34.908775 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:18:34.908775 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Oct 31 01:18:34.908775 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 01:18:34.908775 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 01:18:34.908775 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 01:18:34.921108 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 01:18:34.921108 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:18:34.921108 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Oct 31 01:18:34.909265 unknown[832]: wrote ssh authorized keys file for user: core Oct 31 01:18:35.085449 systemd-networkd[714]: eth0: Gained IPv6LL Oct 31 01:18:35.248465 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 31 01:18:35.686836 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:18:35.686836 ignition[832]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Oct 31 01:18:35.692522 ignition[832]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:18:35.695868 ignition[832]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:18:35.695868 ignition[832]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Oct 31 01:18:35.695868 ignition[832]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Oct 31 01:18:35.703254 ignition[832]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:18:35.721997 ignition[832]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:18:35.724570 ignition[832]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Oct 31 01:18:35.724570 ignition[832]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:18:35.724570 ignition[832]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:18:35.724570 ignition[832]: INFO : files: files passed Oct 31 01:18:35.724570 ignition[832]: INFO : Ignition finished successfully Oct 31 01:18:35.735154 systemd[1]: Finished ignition-files.service. Oct 31 01:18:35.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.737596 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 01:18:35.738197 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 01:18:35.738725 systemd[1]: Starting ignition-quench.service... Oct 31 01:18:35.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.741444 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 01:18:35.741513 systemd[1]: Finished ignition-quench.service. Oct 31 01:18:35.752768 initrd-setup-root-after-ignition[858]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 31 01:18:35.756254 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 01:18:35.759031 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 01:18:35.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.759752 systemd[1]: Reached target ignition-complete.target. Oct 31 01:18:35.763575 systemd[1]: Starting initrd-parse-etc.service... Oct 31 01:18:35.774073 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 01:18:35.774151 systemd[1]: Finished initrd-parse-etc.service. Oct 31 01:18:35.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.776888 systemd[1]: Reached target initrd-fs.target. Oct 31 01:18:35.779146 systemd[1]: Reached target initrd.target. Oct 31 01:18:35.781410 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 01:18:35.782037 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 01:18:35.791479 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 01:18:35.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.792689 systemd[1]: Starting initrd-cleanup.service... Oct 31 01:18:35.800375 systemd[1]: Stopped target nss-lookup.target. Oct 31 01:18:35.801063 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 01:18:35.803439 systemd[1]: Stopped target timers.target. Oct 31 01:18:35.805965 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 01:18:35.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.806057 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 01:18:35.808228 systemd[1]: Stopped target initrd.target. Oct 31 01:18:35.810792 systemd[1]: Stopped target basic.target. Oct 31 01:18:35.813527 systemd[1]: Stopped target ignition-complete.target. Oct 31 01:18:35.815920 systemd[1]: Stopped target ignition-diskful.target. Oct 31 01:18:35.818261 systemd[1]: Stopped target initrd-root-device.target. Oct 31 01:18:35.819115 systemd[1]: Stopped target remote-fs.target. Oct 31 01:18:35.822898 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 01:18:35.825087 systemd[1]: Stopped target sysinit.target. Oct 31 01:18:35.827734 systemd[1]: Stopped target local-fs.target. Oct 31 01:18:35.829785 systemd[1]: Stopped target local-fs-pre.target. Oct 31 01:18:35.832024 systemd[1]: Stopped target swap.target. Oct 31 01:18:35.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.834315 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 01:18:35.834413 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 01:18:35.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.836923 systemd[1]: Stopped target cryptsetup.target. Oct 31 01:18:35.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.838797 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 01:18:35.838879 systemd[1]: Stopped dracut-initqueue.service. Oct 31 01:18:35.842068 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 01:18:35.842151 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 01:18:35.844524 systemd[1]: Stopped target paths.target. Oct 31 01:18:35.846680 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 01:18:35.853168 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 01:18:35.856224 systemd[1]: Stopped target slices.target. Oct 31 01:18:35.857107 systemd[1]: Stopped target sockets.target. Oct 31 01:18:35.860243 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 01:18:35.860309 systemd[1]: Closed iscsid.socket. Oct 31 01:18:35.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.862760 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 01:18:35.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.862847 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 01:18:35.865005 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 01:18:35.865086 systemd[1]: Stopped ignition-files.service. Oct 31 01:18:35.869442 systemd[1]: Stopping ignition-mount.service... Oct 31 01:18:35.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.870388 systemd[1]: Stopping iscsiuio.service... Oct 31 01:18:35.873743 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 01:18:35.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.873879 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 01:18:35.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.877085 systemd[1]: Stopping sysroot-boot.service... Oct 31 01:18:35.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.878136 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 01:18:35.878241 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 01:18:35.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.880286 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 01:18:35.880416 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 01:18:35.884484 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 01:18:35.884559 systemd[1]: Stopped iscsiuio.service. Oct 31 01:18:35.885984 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 01:18:35.886048 systemd[1]: Closed iscsiuio.socket. Oct 31 01:18:35.888181 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 01:18:35.888248 systemd[1]: Finished initrd-cleanup.service. Oct 31 01:18:35.891615 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 01:18:35.909564 ignition[873]: INFO : Ignition 2.14.0 Oct 31 01:18:35.909564 ignition[873]: INFO : Stage: umount Oct 31 01:18:35.911919 ignition[873]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:18:35.911919 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:18:35.915979 ignition[873]: INFO : umount: umount passed Oct 31 01:18:35.917168 ignition[873]: INFO : Ignition finished successfully Oct 31 01:18:35.919118 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 01:18:35.919191 systemd[1]: Stopped ignition-mount.service. Oct 31 01:18:35.921812 systemd[1]: Stopped target network.target. Oct 31 01:18:35.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.923969 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 01:18:35.924005 systemd[1]: Stopped ignition-disks.service. Oct 31 01:18:35.924846 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 01:18:35.924875 systemd[1]: Stopped ignition-kargs.service. Oct 31 01:18:35.926798 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 01:18:35.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.926829 systemd[1]: Stopped ignition-setup.service. Oct 31 01:18:35.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.933636 systemd[1]: Stopping systemd-networkd.service... Oct 31 01:18:35.935992 systemd[1]: Stopping systemd-resolved.service... Oct 31 01:18:35.940383 systemd-networkd[714]: eth0: DHCPv6 lease lost Oct 31 01:18:35.943713 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 01:18:35.945220 systemd[1]: Stopped systemd-networkd.service. Oct 31 01:18:35.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.948362 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 01:18:35.949810 systemd[1]: Stopped sysroot-boot.service. Oct 31 01:18:35.951000 audit: BPF prog-id=9 op=UNLOAD Oct 31 01:18:35.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.952272 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 01:18:35.953776 systemd[1]: Stopped systemd-resolved.service. Oct 31 01:18:35.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.956843 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 01:18:35.956871 systemd[1]: Closed systemd-networkd.socket. Oct 31 01:18:35.958000 audit: BPF prog-id=6 op=UNLOAD Oct 31 01:18:35.960633 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 01:18:35.960671 systemd[1]: Stopped initrd-setup-root.service. Oct 31 01:18:35.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.965254 systemd[1]: Stopping network-cleanup.service... Oct 31 01:18:35.967670 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 01:18:35.967712 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 01:18:35.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.971940 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 01:18:35.971973 systemd[1]: Stopped systemd-sysctl.service. Oct 31 01:18:35.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.975808 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 01:18:35.975845 systemd[1]: Stopped systemd-modules-load.service. Oct 31 01:18:35.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.980010 systemd[1]: Stopping systemd-udevd.service... Oct 31 01:18:35.983103 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 01:18:35.985440 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 01:18:35.986939 systemd[1]: Stopped systemd-udevd.service. Oct 31 01:18:35.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:35.990150 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 01:18:35.990191 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 01:18:35.994297 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 01:18:35.994329 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 01:18:35.998343 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 01:18:35.998396 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 01:18:36.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:36.002243 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 01:18:36.002274 systemd[1]: Stopped dracut-cmdline.service. Oct 31 01:18:36.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:36.006020 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 01:18:36.006052 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 01:18:36.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:36.010611 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 01:18:36.013306 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 01:18:36.013360 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 01:18:36.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:36.017844 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 01:18:36.019336 systemd[1]: Stopped network-cleanup.service. Oct 31 01:18:36.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:36.021971 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 01:18:36.023634 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 01:18:36.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:36.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:36.026561 systemd[1]: Reached target initrd-switch-root.target. Oct 31 01:18:36.029903 systemd[1]: Starting initrd-switch-root.service... Oct 31 01:18:36.045227 systemd[1]: Switching root. Oct 31 01:18:36.064687 iscsid[722]: iscsid shutting down. Oct 31 01:18:36.065720 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Oct 31 01:18:36.065762 systemd-journald[198]: Journal stopped Oct 31 01:18:38.578833 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 01:18:38.578889 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 01:18:38.578900 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 01:18:38.578909 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 01:18:38.578918 kernel: SELinux: policy capability open_perms=1 Oct 31 01:18:38.578934 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 01:18:38.578947 kernel: SELinux: policy capability always_check_network=0 Oct 31 01:18:38.578958 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 01:18:38.578968 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 01:18:38.578981 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 01:18:38.578990 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 01:18:38.579000 kernel: kauditd_printk_skb: 65 callbacks suppressed Oct 31 01:18:38.579009 kernel: audit: type=1403 audit(1761873516.128:76): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 01:18:38.579021 systemd[1]: Successfully loaded SELinux policy in 44.740ms. Oct 31 01:18:38.579036 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.314ms. Oct 31 01:18:38.579048 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:18:38.579059 systemd[1]: Detected virtualization kvm. Oct 31 01:18:38.579069 systemd[1]: Detected architecture x86-64. Oct 31 01:18:38.579079 systemd[1]: Detected first boot. Oct 31 01:18:38.579093 systemd[1]: Initializing machine ID from VM UUID. Oct 31 01:18:38.579103 kernel: audit: type=1400 audit(1761873516.323:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:18:38.579114 kernel: audit: type=1400 audit(1761873516.323:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:18:38.579123 kernel: audit: type=1334 audit(1761873516.333:79): prog-id=10 op=LOAD Oct 31 01:18:38.579133 kernel: audit: type=1334 audit(1761873516.333:80): prog-id=10 op=UNLOAD Oct 31 01:18:38.579142 kernel: audit: type=1334 audit(1761873516.336:81): prog-id=11 op=LOAD Oct 31 01:18:38.579153 kernel: audit: type=1334 audit(1761873516.336:82): prog-id=11 op=UNLOAD Oct 31 01:18:38.579162 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 01:18:38.579172 kernel: audit: type=1400 audit(1761873516.366:83): avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 01:18:38.579183 kernel: audit: type=1300 audit(1761873516.366:83): arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:38.579193 kernel: audit: type=1327 audit(1761873516.366:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:18:38.579204 systemd[1]: Populated /etc with preset unit settings. Oct 31 01:18:38.579214 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:18:38.579224 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:18:38.579235 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:18:38.579246 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 01:18:38.579255 systemd[1]: Stopped iscsid.service. Oct 31 01:18:38.579267 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 01:18:38.579277 systemd[1]: Stopped initrd-switch-root.service. Oct 31 01:18:38.579288 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 01:18:38.579298 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 01:18:38.579309 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 01:18:38.579319 systemd[1]: Created slice system-getty.slice. Oct 31 01:18:38.579330 systemd[1]: Created slice system-modprobe.slice. Oct 31 01:18:38.579340 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 01:18:38.579370 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 01:18:38.579381 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 01:18:38.579391 systemd[1]: Created slice user.slice. Oct 31 01:18:38.579401 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:18:38.579411 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 01:18:38.579422 systemd[1]: Set up automount boot.automount. Oct 31 01:18:38.579432 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 01:18:38.579443 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 01:18:38.579454 systemd[1]: Stopped target initrd-fs.target. Oct 31 01:18:38.579464 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 01:18:38.579474 systemd[1]: Reached target integritysetup.target. Oct 31 01:18:38.579485 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:18:38.579495 systemd[1]: Reached target remote-fs.target. Oct 31 01:18:38.579505 systemd[1]: Reached target slices.target. Oct 31 01:18:38.579523 systemd[1]: Reached target swap.target. Oct 31 01:18:38.579535 systemd[1]: Reached target torcx.target. Oct 31 01:18:38.579546 systemd[1]: Reached target veritysetup.target. Oct 31 01:18:38.579556 systemd[1]: Listening on systemd-coredump.socket. Oct 31 01:18:38.579566 systemd[1]: Listening on systemd-initctl.socket. Oct 31 01:18:38.579578 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:18:38.579588 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:18:38.579598 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:18:38.579608 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 01:18:38.579618 systemd[1]: Mounting dev-hugepages.mount... Oct 31 01:18:38.579629 systemd[1]: Mounting dev-mqueue.mount... Oct 31 01:18:38.579639 systemd[1]: Mounting media.mount... Oct 31 01:18:38.579650 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:38.579659 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 01:18:38.579670 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 01:18:38.579680 systemd[1]: Mounting tmp.mount... Oct 31 01:18:38.579689 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 01:18:38.579700 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:18:38.579709 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:18:38.579720 systemd[1]: Starting modprobe@configfs.service... Oct 31 01:18:38.579730 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:18:38.579740 systemd[1]: Starting modprobe@drm.service... Oct 31 01:18:38.579751 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:18:38.579761 systemd[1]: Starting modprobe@fuse.service... Oct 31 01:18:38.579771 systemd[1]: Starting modprobe@loop.service... Oct 31 01:18:38.579782 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 01:18:38.579792 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 01:18:38.579802 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 01:18:38.579813 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 01:18:38.579823 kernel: loop: module loaded Oct 31 01:18:38.579832 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 01:18:38.579842 kernel: fuse: init (API version 7.34) Oct 31 01:18:38.579852 systemd[1]: Stopped systemd-journald.service. Oct 31 01:18:38.579862 systemd[1]: Starting systemd-journald.service... Oct 31 01:18:38.579873 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:18:38.579883 systemd[1]: Starting systemd-network-generator.service... Oct 31 01:18:38.579893 systemd[1]: Starting systemd-remount-fs.service... Oct 31 01:18:38.579904 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:18:38.579917 systemd-journald[996]: Journal started Oct 31 01:18:38.579952 systemd-journald[996]: Runtime Journal (/run/log/journal/f83a68c891c746d598a70b7758d6fb30) is 6.0M, max 48.5M, 42.5M free. Oct 31 01:18:36.128000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 01:18:36.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:18:36.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:18:36.333000 audit: BPF prog-id=10 op=LOAD Oct 31 01:18:36.333000 audit: BPF prog-id=10 op=UNLOAD Oct 31 01:18:36.336000 audit: BPF prog-id=11 op=LOAD Oct 31 01:18:36.336000 audit: BPF prog-id=11 op=UNLOAD Oct 31 01:18:36.366000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 01:18:36.366000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:36.366000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:18:36.369000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 01:18:36.369000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155979 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:36.369000 audit: CWD cwd="/" Oct 31 01:18:36.369000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:36.369000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:36.369000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:18:38.396000 audit: BPF prog-id=12 op=LOAD Oct 31 01:18:38.396000 audit: BPF prog-id=3 op=UNLOAD Oct 31 01:18:38.396000 audit: BPF prog-id=13 op=LOAD Oct 31 01:18:38.396000 audit: BPF prog-id=14 op=LOAD Oct 31 01:18:38.396000 audit: BPF prog-id=4 op=UNLOAD Oct 31 01:18:38.396000 audit: BPF prog-id=5 op=UNLOAD Oct 31 01:18:38.397000 audit: BPF prog-id=15 op=LOAD Oct 31 01:18:38.397000 audit: BPF prog-id=12 op=UNLOAD Oct 31 01:18:38.397000 audit: BPF prog-id=16 op=LOAD Oct 31 01:18:38.397000 audit: BPF prog-id=17 op=LOAD Oct 31 01:18:38.397000 audit: BPF prog-id=13 op=UNLOAD Oct 31 01:18:38.397000 audit: BPF prog-id=14 op=UNLOAD Oct 31 01:18:38.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.412000 audit: BPF prog-id=15 op=UNLOAD Oct 31 01:18:38.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.562000 audit: BPF prog-id=18 op=LOAD Oct 31 01:18:38.562000 audit: BPF prog-id=19 op=LOAD Oct 31 01:18:38.562000 audit: BPF prog-id=20 op=LOAD Oct 31 01:18:38.562000 audit: BPF prog-id=16 op=UNLOAD Oct 31 01:18:38.563000 audit: BPF prog-id=17 op=UNLOAD Oct 31 01:18:38.577000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 01:18:38.577000 audit[996]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffee9f10ad0 a2=4000 a3=7ffee9f10b6c items=0 ppid=1 pid=996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:38.577000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 01:18:38.395105 systemd[1]: Queued start job for default target multi-user.target. Oct 31 01:18:36.365674 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:18:38.395116 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 31 01:18:36.365949 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:18:38.398484 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 01:18:36.365967 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:18:36.365995 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 01:18:36.366003 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 01:18:36.366032 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 01:18:36.366046 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 01:18:36.366226 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 01:18:36.366256 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:18:36.366267 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:18:36.366853 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 01:18:36.366882 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 01:18:36.366897 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 01:18:36.366909 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 01:18:36.366923 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 01:18:36.366934 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 01:18:38.143553 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:18:38.143791 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:18:38.143883 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:18:38.144029 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:18:38.144072 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 01:18:38.144122 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-10-31T01:18:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 01:18:38.585082 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 01:18:38.585103 systemd[1]: Stopped verity-setup.service. Oct 31 01:18:38.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.589368 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:38.593244 systemd[1]: Started systemd-journald.service. Oct 31 01:18:38.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.593836 systemd[1]: Mounted dev-hugepages.mount. Oct 31 01:18:38.595153 systemd[1]: Mounted dev-mqueue.mount. Oct 31 01:18:38.596450 systemd[1]: Mounted media.mount. Oct 31 01:18:38.597660 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 01:18:38.599019 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 01:18:38.600458 systemd[1]: Mounted tmp.mount. Oct 31 01:18:38.601775 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 01:18:38.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.603374 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:18:38.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.604949 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 01:18:38.605074 systemd[1]: Finished modprobe@configfs.service. Oct 31 01:18:38.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.606688 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:18:38.606822 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:18:38.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.608527 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:18:38.608647 systemd[1]: Finished modprobe@drm.service. Oct 31 01:18:38.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.610154 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:18:38.610269 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:18:38.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.611881 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 01:18:38.611997 systemd[1]: Finished modprobe@fuse.service. Oct 31 01:18:38.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.613483 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:18:38.613590 systemd[1]: Finished modprobe@loop.service. Oct 31 01:18:38.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.615103 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:18:38.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.616805 systemd[1]: Finished systemd-network-generator.service. Oct 31 01:18:38.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.618652 systemd[1]: Finished systemd-remount-fs.service. Oct 31 01:18:38.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.620499 systemd[1]: Reached target network-pre.target. Oct 31 01:18:38.622805 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 01:18:38.624889 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 01:18:38.626184 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 01:18:38.627292 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 01:18:38.629436 systemd[1]: Starting systemd-journal-flush.service... Oct 31 01:18:38.630894 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:18:38.631736 systemd[1]: Starting systemd-random-seed.service... Oct 31 01:18:38.633393 systemd-journald[996]: Time spent on flushing to /var/log/journal/f83a68c891c746d598a70b7758d6fb30 is 13.253ms for 1080 entries. Oct 31 01:18:38.633393 systemd-journald[996]: System Journal (/var/log/journal/f83a68c891c746d598a70b7758d6fb30) is 8.0M, max 195.6M, 187.6M free. Oct 31 01:18:38.664385 systemd-journald[996]: Received client request to flush runtime journal. Oct 31 01:18:38.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:38.633333 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:18:38.634051 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:18:38.637701 systemd[1]: Starting systemd-sysusers.service... Oct 31 01:18:38.640801 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:18:38.665080 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 31 01:18:38.642459 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 01:18:38.643984 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 01:18:38.645845 systemd[1]: Finished systemd-random-seed.service. Oct 31 01:18:38.647787 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:18:38.649690 systemd[1]: Reached target first-boot-complete.target. Oct 31 01:18:38.652295 systemd[1]: Starting systemd-udev-settle.service... Oct 31 01:18:38.654659 systemd[1]: Finished systemd-sysusers.service. Oct 31 01:18:38.665212 systemd[1]: Finished systemd-journal-flush.service. Oct 31 01:18:38.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.193134 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 01:18:39.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.194000 audit: BPF prog-id=21 op=LOAD Oct 31 01:18:39.194000 audit: BPF prog-id=22 op=LOAD Oct 31 01:18:39.194000 audit: BPF prog-id=7 op=UNLOAD Oct 31 01:18:39.194000 audit: BPF prog-id=8 op=UNLOAD Oct 31 01:18:39.195825 systemd[1]: Starting systemd-udevd.service... Oct 31 01:18:39.211332 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Oct 31 01:18:39.224090 systemd[1]: Started systemd-udevd.service. Oct 31 01:18:39.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.226000 audit: BPF prog-id=23 op=LOAD Oct 31 01:18:39.230680 systemd[1]: Starting systemd-networkd.service... Oct 31 01:18:39.236000 audit: BPF prog-id=24 op=LOAD Oct 31 01:18:39.236000 audit: BPF prog-id=25 op=LOAD Oct 31 01:18:39.236000 audit: BPF prog-id=26 op=LOAD Oct 31 01:18:39.237334 systemd[1]: Starting systemd-userdbd.service... Oct 31 01:18:39.258486 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 01:18:39.265272 systemd[1]: Started systemd-userdbd.service. Oct 31 01:18:39.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.282373 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 31 01:18:39.289386 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:18:39.295371 kernel: ACPI: button: Power Button [PWRF] Oct 31 01:18:39.303642 systemd-networkd[1032]: lo: Link UP Oct 31 01:18:39.303890 systemd-networkd[1032]: lo: Gained carrier Oct 31 01:18:39.304306 systemd-networkd[1032]: Enumeration completed Oct 31 01:18:39.304448 systemd[1]: Started systemd-networkd.service. Oct 31 01:18:39.305226 systemd-networkd[1032]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 01:18:39.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.299000 audit[1018]: AVC avc: denied { confidentiality } for pid=1018 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 01:18:39.306755 systemd-networkd[1032]: eth0: Link UP Oct 31 01:18:39.306914 systemd-networkd[1032]: eth0: Gained carrier Oct 31 01:18:39.299000 audit[1018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56401c4b04a0 a1=338ec a2=7f394b080bc5 a3=5 items=110 ppid=1013 pid=1018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:39.299000 audit: CWD cwd="/" Oct 31 01:18:39.299000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=1 name=(null) inode=15662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=2 name=(null) inode=15662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=3 name=(null) inode=15663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=4 name=(null) inode=15662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=5 name=(null) inode=15664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=6 name=(null) inode=15662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=7 name=(null) inode=15665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=8 name=(null) inode=15665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=9 name=(null) inode=15666 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=10 name=(null) inode=15665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=11 name=(null) inode=15667 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=12 name=(null) inode=15665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=13 name=(null) inode=15668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=14 name=(null) inode=15665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=15 name=(null) inode=15669 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=16 name=(null) inode=15665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=17 name=(null) inode=15670 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=18 name=(null) inode=15662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=19 name=(null) inode=15671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=20 name=(null) inode=15671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=21 name=(null) inode=15672 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=22 name=(null) inode=15671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=23 name=(null) inode=15673 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=24 name=(null) inode=15671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=25 name=(null) inode=15674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=26 name=(null) inode=15671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=27 name=(null) inode=15675 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=28 name=(null) inode=15671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=29 name=(null) inode=15676 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=30 name=(null) inode=15662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=31 name=(null) inode=15677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=32 name=(null) inode=15677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=33 name=(null) inode=15678 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=34 name=(null) inode=15677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=35 name=(null) inode=15679 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=36 name=(null) inode=15677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=37 name=(null) inode=15680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=38 name=(null) inode=15677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=39 name=(null) inode=15681 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=40 name=(null) inode=15677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=41 name=(null) inode=15682 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=42 name=(null) inode=15662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=43 name=(null) inode=15683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=44 name=(null) inode=15683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=45 name=(null) inode=15684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=46 name=(null) inode=15683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=47 name=(null) inode=15685 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=48 name=(null) inode=15683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=49 name=(null) inode=15686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=50 name=(null) inode=15683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=51 name=(null) inode=15687 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=52 name=(null) inode=15683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=53 name=(null) inode=15688 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=55 name=(null) inode=15689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=56 name=(null) inode=15689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=57 name=(null) inode=15690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=58 name=(null) inode=15689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=59 name=(null) inode=15691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=60 name=(null) inode=15689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=61 name=(null) inode=15692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=62 name=(null) inode=15692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=63 name=(null) inode=15693 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=64 name=(null) inode=15692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=65 name=(null) inode=15694 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.319471 systemd-networkd[1032]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 01:18:39.299000 audit: PATH item=66 name=(null) inode=15692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=67 name=(null) inode=15695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=68 name=(null) inode=15692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=69 name=(null) inode=15696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=70 name=(null) inode=15692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=71 name=(null) inode=15697 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=72 name=(null) inode=15689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=73 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=74 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=75 name=(null) inode=15699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=76 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=77 name=(null) inode=15700 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=78 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=79 name=(null) inode=15701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=80 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=81 name=(null) inode=15702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=82 name=(null) inode=15698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=83 name=(null) inode=15703 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=84 name=(null) inode=15689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=85 name=(null) inode=15704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=86 name=(null) inode=15704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=87 name=(null) inode=15705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=88 name=(null) inode=15704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=89 name=(null) inode=15706 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=90 name=(null) inode=15704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=91 name=(null) inode=15707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=92 name=(null) inode=15704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=93 name=(null) inode=15708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=94 name=(null) inode=15704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=95 name=(null) inode=15709 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=96 name=(null) inode=15689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=97 name=(null) inode=15710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=98 name=(null) inode=15710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=99 name=(null) inode=15711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=100 name=(null) inode=15710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=101 name=(null) inode=15712 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=102 name=(null) inode=15710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=103 name=(null) inode=15713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=104 name=(null) inode=15710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=105 name=(null) inode=15714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=106 name=(null) inode=15710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=107 name=(null) inode=15715 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PATH item=109 name=(null) inode=15716 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:18:39.299000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 01:18:39.332475 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 31 01:18:39.332701 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 31 01:18:39.332817 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 31 01:18:39.338405 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Oct 31 01:18:39.342370 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 01:18:39.407216 kernel: kvm: Nested Virtualization enabled Oct 31 01:18:39.407297 kernel: SVM: kvm: Nested Paging enabled Oct 31 01:18:39.407327 kernel: SVM: Virtual VMLOAD VMSAVE supported Oct 31 01:18:39.408357 kernel: SVM: Virtual GIF supported Oct 31 01:18:39.424377 kernel: EDAC MC: Ver: 3.0.0 Oct 31 01:18:39.456673 systemd[1]: Finished systemd-udev-settle.service. Oct 31 01:18:39.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.459048 systemd[1]: Starting lvm2-activation-early.service... Oct 31 01:18:39.466969 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:18:39.489221 systemd[1]: Finished lvm2-activation-early.service. Oct 31 01:18:39.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.490738 systemd[1]: Reached target cryptsetup.target. Oct 31 01:18:39.492913 systemd[1]: Starting lvm2-activation.service... Oct 31 01:18:39.497372 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:18:39.521634 systemd[1]: Finished lvm2-activation.service. Oct 31 01:18:39.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.523119 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:18:39.524550 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 01:18:39.524575 systemd[1]: Reached target local-fs.target. Oct 31 01:18:39.525891 systemd[1]: Reached target machines.target. Oct 31 01:18:39.528207 systemd[1]: Starting ldconfig.service... Oct 31 01:18:39.529727 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:18:39.529760 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:18:39.530548 systemd[1]: Starting systemd-boot-update.service... Oct 31 01:18:39.532794 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 01:18:39.535857 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 01:18:39.541441 systemd[1]: Starting systemd-sysext.service... Oct 31 01:18:39.543336 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 01:18:39.545332 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1052 (bootctl) Oct 31 01:18:39.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.546387 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 01:18:39.551332 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 01:18:39.562246 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 01:18:39.562397 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 01:18:39.573401 kernel: loop0: detected capacity change from 0 to 224512 Oct 31 01:18:39.786593 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 01:18:39.788162 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 01:18:39.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.790128 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) Oct 31 01:18:39.790128 systemd-fsck[1060]: /dev/vda1: 790 files, 120772/258078 clusters Oct 31 01:18:39.791519 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 01:18:39.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.795449 systemd[1]: Mounting boot.mount... Oct 31 01:18:39.798538 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 01:18:39.801515 systemd[1]: Mounted boot.mount. Oct 31 01:18:39.814241 systemd[1]: Finished systemd-boot-update.service. Oct 31 01:18:39.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.827362 kernel: loop1: detected capacity change from 0 to 224512 Oct 31 01:18:39.831900 (sd-sysext)[1065]: Using extensions 'kubernetes'. Oct 31 01:18:39.832205 (sd-sysext)[1065]: Merged extensions into '/usr'. Oct 31 01:18:39.847890 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:39.849170 systemd[1]: Mounting usr-share-oem.mount... Oct 31 01:18:39.850648 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:18:39.851707 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:18:39.854006 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:18:39.856468 systemd[1]: Starting modprobe@loop.service... Oct 31 01:18:39.857885 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:18:39.858000 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:18:39.858101 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:39.860536 systemd[1]: Mounted usr-share-oem.mount. Oct 31 01:18:39.862052 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:18:39.862155 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:18:39.862971 ldconfig[1051]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 01:18:39.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.864012 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:18:39.864108 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:18:39.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.866089 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:18:39.866196 systemd[1]: Finished modprobe@loop.service. Oct 31 01:18:39.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.868187 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:18:39.868275 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:18:39.869147 systemd[1]: Finished ldconfig.service. Oct 31 01:18:39.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.870654 systemd[1]: Finished systemd-sysext.service. Oct 31 01:18:39.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:39.872950 systemd[1]: Starting ensure-sysext.service... Oct 31 01:18:39.875049 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 01:18:39.879461 systemd[1]: Reloading. Oct 31 01:18:39.886184 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 01:18:39.888177 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 01:18:39.891236 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 01:18:39.935818 /usr/lib/systemd/system-generators/torcx-generator[1092]: time="2025-10-31T01:18:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:18:39.936100 /usr/lib/systemd/system-generators/torcx-generator[1092]: time="2025-10-31T01:18:39Z" level=info msg="torcx already run" Oct 31 01:18:39.992653 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:18:39.992671 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:18:40.009344 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:18:40.060000 audit: BPF prog-id=27 op=LOAD Oct 31 01:18:40.060000 audit: BPF prog-id=24 op=UNLOAD Oct 31 01:18:40.060000 audit: BPF prog-id=28 op=LOAD Oct 31 01:18:40.060000 audit: BPF prog-id=29 op=LOAD Oct 31 01:18:40.060000 audit: BPF prog-id=25 op=UNLOAD Oct 31 01:18:40.060000 audit: BPF prog-id=26 op=UNLOAD Oct 31 01:18:40.061000 audit: BPF prog-id=30 op=LOAD Oct 31 01:18:40.061000 audit: BPF prog-id=18 op=UNLOAD Oct 31 01:18:40.062000 audit: BPF prog-id=31 op=LOAD Oct 31 01:18:40.062000 audit: BPF prog-id=32 op=LOAD Oct 31 01:18:40.062000 audit: BPF prog-id=19 op=UNLOAD Oct 31 01:18:40.062000 audit: BPF prog-id=20 op=UNLOAD Oct 31 01:18:40.062000 audit: BPF prog-id=33 op=LOAD Oct 31 01:18:40.062000 audit: BPF prog-id=23 op=UNLOAD Oct 31 01:18:40.063000 audit: BPF prog-id=34 op=LOAD Oct 31 01:18:40.063000 audit: BPF prog-id=35 op=LOAD Oct 31 01:18:40.063000 audit: BPF prog-id=21 op=UNLOAD Oct 31 01:18:40.063000 audit: BPF prog-id=22 op=UNLOAD Oct 31 01:18:40.066165 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 01:18:40.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:40.070870 systemd[1]: Starting audit-rules.service... Oct 31 01:18:40.073187 systemd[1]: Starting clean-ca-certificates.service... Oct 31 01:18:40.075768 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 01:18:40.077000 audit: BPF prog-id=36 op=LOAD Oct 31 01:18:40.078701 systemd[1]: Starting systemd-resolved.service... Oct 31 01:18:40.080000 audit: BPF prog-id=37 op=LOAD Oct 31 01:18:40.081397 systemd[1]: Starting systemd-timesyncd.service... Oct 31 01:18:40.083533 systemd[1]: Starting systemd-update-utmp.service... Oct 31 01:18:40.085507 systemd[1]: Finished clean-ca-certificates.service. Oct 31 01:18:40.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:40.087000 audit[1147]: SYSTEM_BOOT pid=1147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 01:18:40.090325 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:18:40.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:40.092081 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 01:18:40.095794 systemd[1]: Finished systemd-update-utmp.service. Oct 31 01:18:40.095000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 01:18:40.095000 audit[1155]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6db73b60 a2=420 a3=0 items=0 ppid=1135 pid=1155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:40.095000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 01:18:40.097388 augenrules[1155]: No rules Oct 31 01:18:40.097663 systemd[1]: Finished audit-rules.service. Oct 31 01:18:40.099860 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:40.100043 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.101219 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:18:40.103249 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:18:40.105323 systemd[1]: Starting modprobe@loop.service... Oct 31 01:18:40.106443 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.106554 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:18:40.107749 systemd[1]: Starting systemd-update-done.service... Oct 31 01:18:40.108965 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:18:40.109051 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:40.109891 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:18:40.109995 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:18:40.111595 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:18:40.111694 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:18:40.113299 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:18:40.113464 systemd[1]: Finished modprobe@loop.service. Oct 31 01:18:40.115008 systemd[1]: Finished systemd-update-done.service. Oct 31 01:18:40.117653 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:40.117831 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.118857 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:18:40.120852 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:18:40.122892 systemd[1]: Starting modprobe@loop.service... Oct 31 01:18:40.124005 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.124097 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:18:40.124181 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:18:40.124243 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:40.124980 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:18:40.125204 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:18:40.126833 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:18:40.126951 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:18:40.128639 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:18:40.128741 systemd[1]: Finished modprobe@loop.service. Oct 31 01:18:40.130311 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:18:40.130440 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.132648 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:40.132837 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.133830 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:18:40.135836 systemd[1]: Starting modprobe@drm.service... Oct 31 01:18:40.137921 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:18:40.140026 systemd[1]: Starting modprobe@loop.service... Oct 31 01:18:40.141271 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.141434 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:18:40.142434 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 01:18:40.142454 systemd-resolved[1144]: Positive Trust Anchors: Oct 31 01:18:40.142461 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:18:40.142495 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:18:40.144125 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:18:40.144212 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:18:40.145186 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:18:40.145275 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:18:40.147147 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:18:40.147244 systemd[1]: Finished modprobe@drm.service. Oct 31 01:18:40.148979 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:18:40.149071 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:18:40.150124 systemd-resolved[1144]: Defaulting to hostname 'linux'. Oct 31 01:18:40.150764 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:18:40.150859 systemd[1]: Finished modprobe@loop.service. Oct 31 01:18:40.152289 systemd[1]: Started systemd-resolved.service. Oct 31 01:18:40.153998 systemd[1]: Reached target network.target. Oct 31 01:18:40.155268 systemd[1]: Reached target nss-lookup.target. Oct 31 01:18:40.156550 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:18:40.156579 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.156829 systemd[1]: Finished ensure-sysext.service. Oct 31 01:18:40.171929 systemd[1]: Started systemd-timesyncd.service. Oct 31 01:18:40.173298 systemd[1]: Reached target sysinit.target. Oct 31 01:18:40.174578 systemd[1]: Started motdgen.path. Oct 31 01:18:40.175617 systemd-timesyncd[1145]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 31 01:18:40.175663 systemd-timesyncd[1145]: Initial clock synchronization to Fri 2025-10-31 01:18:40.543050 UTC. Oct 31 01:18:40.175898 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 01:18:40.177664 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 01:18:40.178999 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 01:18:40.179024 systemd[1]: Reached target paths.target. Oct 31 01:18:40.180172 systemd[1]: Reached target time-set.target. Oct 31 01:18:40.181540 systemd[1]: Started logrotate.timer. Oct 31 01:18:40.182741 systemd[1]: Started mdadm.timer. Oct 31 01:18:40.183785 systemd[1]: Reached target timers.target. Oct 31 01:18:40.185226 systemd[1]: Listening on dbus.socket. Oct 31 01:18:40.187267 systemd[1]: Starting docker.socket... Oct 31 01:18:40.190309 systemd[1]: Listening on sshd.socket. Oct 31 01:18:40.191545 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:18:40.191923 systemd[1]: Listening on docker.socket. Oct 31 01:18:40.193147 systemd[1]: Reached target sockets.target. Oct 31 01:18:40.194387 systemd[1]: Reached target basic.target. Oct 31 01:18:40.195608 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.195631 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:18:40.196420 systemd[1]: Starting containerd.service... Oct 31 01:18:40.198337 systemd[1]: Starting dbus.service... Oct 31 01:18:40.200166 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 01:18:40.202325 systemd[1]: Starting extend-filesystems.service... Oct 31 01:18:40.203674 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 01:18:40.204567 systemd[1]: Starting motdgen.service... Oct 31 01:18:40.206577 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 01:18:40.208773 systemd[1]: Starting sshd-keygen.service... Oct 31 01:18:40.210429 jq[1177]: false Oct 31 01:18:40.215131 extend-filesystems[1178]: Found loop1 Oct 31 01:18:40.215295 systemd[1]: Starting systemd-logind.service... Oct 31 01:18:40.216280 extend-filesystems[1178]: Found sr0 Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda1 Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda2 Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda3 Oct 31 01:18:40.218111 extend-filesystems[1178]: Found usr Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda4 Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda6 Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda7 Oct 31 01:18:40.218111 extend-filesystems[1178]: Found vda9 Oct 31 01:18:40.218111 extend-filesystems[1178]: Checking size of /dev/vda9 Oct 31 01:18:40.219950 dbus-daemon[1176]: [system] SELinux support is enabled Oct 31 01:18:40.228918 extend-filesystems[1178]: Resized partition /dev/vda9 Oct 31 01:18:40.229541 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:18:40.229593 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 01:18:40.231442 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 01:18:40.232151 systemd[1]: Starting update-engine.service... Oct 31 01:18:40.234962 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 01:18:40.235507 extend-filesystems[1198]: resize2fs 1.46.5 (30-Dec-2021) Oct 31 01:18:40.238497 systemd[1]: Started dbus.service. Oct 31 01:18:40.238654 jq[1200]: true Oct 31 01:18:40.246457 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Oct 31 01:18:40.242796 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 01:18:40.242956 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 01:18:40.243177 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 01:18:40.243316 systemd[1]: Finished motdgen.service. Oct 31 01:18:40.247203 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 01:18:40.247341 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 01:18:40.252884 jq[1203]: true Oct 31 01:18:40.257909 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 01:18:40.257933 systemd[1]: Reached target system-config.target. Oct 31 01:18:40.259769 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 01:18:40.259787 systemd[1]: Reached target user-config.target. Oct 31 01:18:40.262142 update_engine[1199]: I1031 01:18:40.262003 1199 main.cc:92] Flatcar Update Engine starting Oct 31 01:18:40.263619 update_engine[1199]: I1031 01:18:40.263582 1199 update_check_scheduler.cc:74] Next update check in 11m39s Oct 31 01:18:40.263796 systemd[1]: Started update-engine.service. Oct 31 01:18:40.266992 systemd[1]: Started locksmithd.service. Oct 31 01:18:40.273372 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Oct 31 01:18:40.299933 extend-filesystems[1198]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 31 01:18:40.299933 extend-filesystems[1198]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 31 01:18:40.299933 extend-filesystems[1198]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Oct 31 01:18:40.308384 extend-filesystems[1178]: Resized filesystem in /dev/vda9 Oct 31 01:18:40.300829 systemd-logind[1187]: Watching system buttons on /dev/input/event1 (Power Button) Oct 31 01:18:40.310554 env[1204]: time="2025-10-31T01:18:40.300538311Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 01:18:40.300848 systemd-logind[1187]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 01:18:40.301997 systemd-logind[1187]: New seat seat0. Oct 31 01:18:40.306015 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 01:18:40.306167 systemd[1]: Finished extend-filesystems.service. Oct 31 01:18:40.309540 systemd[1]: Started systemd-logind.service. Oct 31 01:18:40.323369 env[1204]: time="2025-10-31T01:18:40.323293826Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 01:18:40.323682 env[1204]: time="2025-10-31T01:18:40.323665252Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:18:40.324911 env[1204]: time="2025-10-31T01:18:40.324885140Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:18:40.324935 locksmithd[1213]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 01:18:40.325130 env[1204]: time="2025-10-31T01:18:40.325110763Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:18:40.325389 env[1204]: time="2025-10-31T01:18:40.325367715Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:18:40.325462 env[1204]: time="2025-10-31T01:18:40.325443537Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 01:18:40.325548 env[1204]: time="2025-10-31T01:18:40.325528356Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 01:18:40.325618 env[1204]: time="2025-10-31T01:18:40.325599439Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 01:18:40.325762 env[1204]: time="2025-10-31T01:18:40.325745213Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:18:40.326018 env[1204]: time="2025-10-31T01:18:40.325997265Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:18:40.326212 env[1204]: time="2025-10-31T01:18:40.326192121Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:18:40.326284 env[1204]: time="2025-10-31T01:18:40.326265088Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 01:18:40.326402 env[1204]: time="2025-10-31T01:18:40.326384442Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 01:18:40.326489 env[1204]: time="2025-10-31T01:18:40.326462368Z" level=info msg="metadata content store policy set" policy=shared Oct 31 01:18:40.341835 bash[1227]: Updated "/home/core/.ssh/authorized_keys" Oct 31 01:18:40.342449 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 01:18:40.675234 sshd_keygen[1190]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 01:18:40.693400 systemd[1]: Finished sshd-keygen.service. Oct 31 01:18:40.695998 systemd[1]: Starting issuegen.service... Oct 31 01:18:40.701487 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 01:18:40.701604 systemd[1]: Finished issuegen.service. Oct 31 01:18:40.703916 systemd[1]: Starting systemd-user-sessions.service... Oct 31 01:18:40.709400 env[1204]: time="2025-10-31T01:18:40.709363785Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 01:18:40.709449 env[1204]: time="2025-10-31T01:18:40.709403749Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 01:18:40.709449 env[1204]: time="2025-10-31T01:18:40.709419208Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 01:18:40.709511 env[1204]: time="2025-10-31T01:18:40.709469603Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709511 env[1204]: time="2025-10-31T01:18:40.709491815Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709572 env[1204]: time="2025-10-31T01:18:40.709530617Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709572 env[1204]: time="2025-10-31T01:18:40.709551236Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709572 env[1204]: time="2025-10-31T01:18:40.709567597Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709637 env[1204]: time="2025-10-31T01:18:40.709582194Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709637 env[1204]: time="2025-10-31T01:18:40.709596842Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709637 env[1204]: time="2025-10-31T01:18:40.709612200Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.709637 env[1204]: time="2025-10-31T01:18:40.709624884Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 01:18:40.709745 env[1204]: time="2025-10-31T01:18:40.709722577Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 01:18:40.709817 env[1204]: time="2025-10-31T01:18:40.709798550Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 01:18:40.710134 env[1204]: time="2025-10-31T01:18:40.710101278Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 01:18:40.710170 env[1204]: time="2025-10-31T01:18:40.710155229Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.710192 env[1204]: time="2025-10-31T01:18:40.710170457Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 01:18:40.710257 env[1204]: time="2025-10-31T01:18:40.710218908Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.710257 env[1204]: time="2025-10-31T01:18:40.710236100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.710257 env[1204]: time="2025-10-31T01:18:40.710249275Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.710257 env[1204]: time="2025-10-31T01:18:40.710262440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710274372Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710286365Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710297315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710307675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710321190Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710477964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710492702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710509193Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710520123Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710536474Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710547885Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710565949Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 01:18:40.711854 env[1204]: time="2025-10-31T01:18:40.710599342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 01:18:40.710244 systemd[1]: Finished systemd-user-sessions.service. Oct 31 01:18:40.711899 systemd[1]: Started containerd.service. Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.710772266Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.710819324Z" level=info msg="Connect containerd service" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.710853558Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711327247Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711468462Z" level=info msg="Start subscribing containerd event" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711512384Z" level=info msg="Start recovering state" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711561616Z" level=info msg="Start event monitor" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711560524Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711582265Z" level=info msg="Start snapshots syncer" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711591913Z" level=info msg="Start cni network conf syncer for default" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711594057Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711601441Z" level=info msg="Start streaming server" Oct 31 01:18:40.713394 env[1204]: time="2025-10-31T01:18:40.711630776Z" level=info msg="containerd successfully booted in 0.429302s" Oct 31 01:18:40.715762 systemd[1]: Started getty@tty1.service. Oct 31 01:18:40.717982 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 01:18:40.719599 systemd[1]: Reached target getty.target. Oct 31 01:18:41.102691 systemd-networkd[1032]: eth0: Gained IPv6LL Oct 31 01:18:41.104679 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 01:18:41.106730 systemd[1]: Reached target network-online.target. Oct 31 01:18:41.109709 systemd[1]: Starting kubelet.service... Oct 31 01:18:41.768562 systemd[1]: Started kubelet.service. Oct 31 01:18:41.770198 systemd[1]: Reached target multi-user.target. Oct 31 01:18:41.772751 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 01:18:41.781236 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 01:18:41.781415 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 01:18:41.783195 systemd[1]: Startup finished in 718ms (kernel) + 4.378s (initrd) + 5.700s (userspace) = 10.797s. Oct 31 01:18:42.162391 kubelet[1253]: E1031 01:18:42.162260 1253 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:18:42.163987 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:18:42.164122 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:18:44.157281 systemd[1]: Created slice system-sshd.slice. Oct 31 01:18:44.158338 systemd[1]: Started sshd@0-10.0.0.143:22-10.0.0.1:50708.service. Oct 31 01:18:44.190660 sshd[1263]: Accepted publickey for core from 10.0.0.1 port 50708 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:44.191939 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.200764 systemd-logind[1187]: New session 1 of user core. Oct 31 01:18:44.201833 systemd[1]: Created slice user-500.slice. Oct 31 01:18:44.202927 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 01:18:44.210770 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 01:18:44.212092 systemd[1]: Starting user@500.service... Oct 31 01:18:44.214783 (systemd)[1266]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.280905 systemd[1266]: Queued start job for default target default.target. Oct 31 01:18:44.281277 systemd[1266]: Reached target paths.target. Oct 31 01:18:44.281304 systemd[1266]: Reached target sockets.target. Oct 31 01:18:44.281322 systemd[1266]: Reached target timers.target. Oct 31 01:18:44.281336 systemd[1266]: Reached target basic.target. Oct 31 01:18:44.281397 systemd[1266]: Reached target default.target. Oct 31 01:18:44.281433 systemd[1266]: Startup finished in 61ms. Oct 31 01:18:44.281435 systemd[1]: Started user@500.service. Oct 31 01:18:44.282250 systemd[1]: Started session-1.scope. Oct 31 01:18:44.334758 systemd[1]: Started sshd@1-10.0.0.143:22-10.0.0.1:50714.service. Oct 31 01:18:44.367527 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 50714 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:44.368481 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.371818 systemd-logind[1187]: New session 2 of user core. Oct 31 01:18:44.372910 systemd[1]: Started session-2.scope. Oct 31 01:18:44.426340 sshd[1275]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:44.429315 systemd[1]: Started sshd@2-10.0.0.143:22-10.0.0.1:50730.service. Oct 31 01:18:44.429687 systemd[1]: sshd@1-10.0.0.143:22-10.0.0.1:50714.service: Deactivated successfully. Oct 31 01:18:44.430424 systemd-logind[1187]: Session 2 logged out. Waiting for processes to exit. Oct 31 01:18:44.430456 systemd[1]: session-2.scope: Deactivated successfully. Oct 31 01:18:44.431237 systemd-logind[1187]: Removed session 2. Oct 31 01:18:44.458012 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 50730 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:44.459043 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.462296 systemd-logind[1187]: New session 3 of user core. Oct 31 01:18:44.463256 systemd[1]: Started session-3.scope. Oct 31 01:18:44.514549 sshd[1280]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:44.517208 systemd[1]: sshd@2-10.0.0.143:22-10.0.0.1:50730.service: Deactivated successfully. Oct 31 01:18:44.517677 systemd[1]: session-3.scope: Deactivated successfully. Oct 31 01:18:44.518107 systemd-logind[1187]: Session 3 logged out. Waiting for processes to exit. Oct 31 01:18:44.519047 systemd[1]: Started sshd@3-10.0.0.143:22-10.0.0.1:50738.service. Oct 31 01:18:44.519611 systemd-logind[1187]: Removed session 3. Oct 31 01:18:44.548560 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 50738 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:44.549404 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.552090 systemd-logind[1187]: New session 4 of user core. Oct 31 01:18:44.552766 systemd[1]: Started session-4.scope. Oct 31 01:18:44.605748 sshd[1287]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:44.608523 systemd[1]: sshd@3-10.0.0.143:22-10.0.0.1:50738.service: Deactivated successfully. Oct 31 01:18:44.609160 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 01:18:44.609792 systemd-logind[1187]: Session 4 logged out. Waiting for processes to exit. Oct 31 01:18:44.610794 systemd[1]: Started sshd@4-10.0.0.143:22-10.0.0.1:50744.service. Oct 31 01:18:44.611584 systemd-logind[1187]: Removed session 4. Oct 31 01:18:44.639391 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 50744 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:44.640193 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.643297 systemd-logind[1187]: New session 5 of user core. Oct 31 01:18:44.644196 systemd[1]: Started session-5.scope. Oct 31 01:18:44.700643 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 01:18:44.700824 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:18:44.709579 dbus-daemon[1176]: \xd0}\u000c\xee/V: received setenforce notice (enforcing=996638224) Oct 31 01:18:44.711598 sudo[1297]: pam_unix(sudo:session): session closed for user root Oct 31 01:18:44.713194 sshd[1293]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:44.715890 systemd[1]: sshd@4-10.0.0.143:22-10.0.0.1:50744.service: Deactivated successfully. Oct 31 01:18:44.716388 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 01:18:44.716860 systemd-logind[1187]: Session 5 logged out. Waiting for processes to exit. Oct 31 01:18:44.717790 systemd[1]: Started sshd@5-10.0.0.143:22-10.0.0.1:50748.service. Oct 31 01:18:44.718574 systemd-logind[1187]: Removed session 5. Oct 31 01:18:44.747375 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 50748 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:44.748405 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.751566 systemd-logind[1187]: New session 6 of user core. Oct 31 01:18:44.752478 systemd[1]: Started session-6.scope. Oct 31 01:18:44.805024 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 01:18:44.805195 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:18:44.807550 sudo[1305]: pam_unix(sudo:session): session closed for user root Oct 31 01:18:44.811985 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 01:18:44.812181 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:18:44.819868 systemd[1]: Stopping audit-rules.service... Oct 31 01:18:44.820000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:18:44.821244 auditctl[1308]: No rules Oct 31 01:18:44.821550 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 01:18:44.821679 systemd[1]: Stopped audit-rules.service. Oct 31 01:18:44.822531 kernel: kauditd_printk_skb: 227 callbacks suppressed Oct 31 01:18:44.822572 kernel: audit: type=1305 audit(1761873524.820:189): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:18:44.822928 systemd[1]: Starting audit-rules.service... Oct 31 01:18:44.820000 audit[1308]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc4e122f0 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:44.833395 kernel: audit: type=1300 audit(1761873524.820:189): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc4e122f0 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:44.833441 kernel: audit: type=1327 audit(1761873524.820:189): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:18:44.820000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:18:44.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.838804 augenrules[1325]: No rules Oct 31 01:18:44.839254 systemd[1]: Finished audit-rules.service. Oct 31 01:18:44.839968 sudo[1304]: pam_unix(sudo:session): session closed for user root Oct 31 01:18:44.841083 kernel: audit: type=1131 audit(1761873524.820:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.841132 kernel: audit: type=1130 audit(1761873524.838:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.841299 sshd[1301]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:44.843991 systemd[1]: Started sshd@6-10.0.0.143:22-10.0.0.1:50750.service. Oct 31 01:18:44.844434 systemd[1]: sshd@5-10.0.0.143:22-10.0.0.1:50748.service: Deactivated successfully. Oct 31 01:18:44.844889 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 01:18:44.846520 kernel: audit: type=1106 audit(1761873524.838:192): pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.838000 audit[1304]: USER_END pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.846667 systemd-logind[1187]: Session 6 logged out. Waiting for processes to exit. Oct 31 01:18:44.847694 systemd-logind[1187]: Removed session 6. Oct 31 01:18:44.852630 kernel: audit: type=1104 audit(1761873524.838:193): pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.838000 audit[1304]: CRED_DISP pid=1304 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.858111 kernel: audit: type=1106 audit(1761873524.840:194): pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.840000 audit[1301]: USER_END pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.865565 kernel: audit: type=1104 audit(1761873524.842:195): pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.842000 audit[1301]: CRED_DISP pid=1301 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.871524 kernel: audit: type=1130 audit(1761873524.843:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:50750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:50750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:50748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.878000 audit[1330]: USER_ACCT pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.879460 sshd[1330]: Accepted publickey for core from 10.0.0.1 port 50750 ssh2: RSA SHA256:BzWaVf4M0LrLtWllQvHpK+M/9x+T9duV7gwz9J5cQAA Oct 31 01:18:44.879000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.879000 audit[1330]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c65d220 a2=3 a3=0 items=0 ppid=1 pid=1330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:44.879000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:18:44.880510 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:18:44.883777 systemd-logind[1187]: New session 7 of user core. Oct 31 01:18:44.884680 systemd[1]: Started session-7.scope. Oct 31 01:18:44.887000 audit[1330]: USER_START pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.888000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:44.936000 audit[1334]: USER_ACCT pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.937760 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 01:18:44.936000 audit[1334]: CRED_REFR pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.937954 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:18:44.937000 audit[1334]: USER_START pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.948722 systemd[1]: Starting coreos-metadata.service... Oct 31 01:18:44.954255 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 31 01:18:44.954372 systemd[1]: Finished coreos-metadata.service. Oct 31 01:18:44.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:44.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:45.366728 systemd[1]: Stopped kubelet.service. Oct 31 01:18:45.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:45.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:45.368633 systemd[1]: Starting kubelet.service... Oct 31 01:18:45.387307 systemd[1]: Reloading. Oct 31 01:18:45.464097 /usr/lib/systemd/system-generators/torcx-generator[1392]: time="2025-10-31T01:18:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:18:45.464130 /usr/lib/systemd/system-generators/torcx-generator[1392]: time="2025-10-31T01:18:45Z" level=info msg="torcx already run" Oct 31 01:18:45.812688 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:18:45.812705 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:18:45.829514 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.886000 audit: BPF prog-id=43 op=LOAD Oct 31 01:18:45.886000 audit: BPF prog-id=37 op=UNLOAD Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit: BPF prog-id=44 op=LOAD Oct 31 01:18:45.888000 audit: BPF prog-id=27 op=UNLOAD Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit: BPF prog-id=45 op=LOAD Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit: BPF prog-id=46 op=LOAD Oct 31 01:18:45.889000 audit: BPF prog-id=28 op=UNLOAD Oct 31 01:18:45.889000 audit: BPF prog-id=29 op=UNLOAD Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit: BPF prog-id=47 op=LOAD Oct 31 01:18:45.890000 audit: BPF prog-id=30 op=UNLOAD Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit: BPF prog-id=48 op=LOAD Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit: BPF prog-id=49 op=LOAD Oct 31 01:18:45.890000 audit: BPF prog-id=31 op=UNLOAD Oct 31 01:18:45.890000 audit: BPF prog-id=32 op=UNLOAD Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit: BPF prog-id=50 op=LOAD Oct 31 01:18:45.891000 audit: BPF prog-id=38 op=UNLOAD Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit: BPF prog-id=51 op=LOAD Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit: BPF prog-id=52 op=LOAD Oct 31 01:18:45.891000 audit: BPF prog-id=39 op=UNLOAD Oct 31 01:18:45.891000 audit: BPF prog-id=40 op=UNLOAD Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit: BPF prog-id=53 op=LOAD Oct 31 01:18:45.892000 audit: BPF prog-id=33 op=UNLOAD Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit: BPF prog-id=54 op=LOAD Oct 31 01:18:45.893000 audit: BPF prog-id=41 op=UNLOAD Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit: BPF prog-id=55 op=LOAD Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.893000 audit: BPF prog-id=56 op=LOAD Oct 31 01:18:45.893000 audit: BPF prog-id=34 op=UNLOAD Oct 31 01:18:45.893000 audit: BPF prog-id=35 op=UNLOAD Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:45.894000 audit: BPF prog-id=57 op=LOAD Oct 31 01:18:45.894000 audit: BPF prog-id=36 op=UNLOAD Oct 31 01:18:45.905543 systemd[1]: Started kubelet.service. Oct 31 01:18:45.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:45.906723 systemd[1]: Stopping kubelet.service... Oct 31 01:18:45.906956 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 01:18:45.907103 systemd[1]: Stopped kubelet.service. Oct 31 01:18:45.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:45.908309 systemd[1]: Starting kubelet.service... Oct 31 01:18:45.991275 systemd[1]: Started kubelet.service. Oct 31 01:18:45.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:46.028400 kubelet[1441]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:18:46.028400 kubelet[1441]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:18:46.028400 kubelet[1441]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:18:46.028791 kubelet[1441]: I1031 01:18:46.028464 1441 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:18:46.484362 kubelet[1441]: I1031 01:18:46.484319 1441 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 31 01:18:46.484362 kubelet[1441]: I1031 01:18:46.484346 1441 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:18:46.484626 kubelet[1441]: I1031 01:18:46.484607 1441 server.go:954] "Client rotation is on, will bootstrap in background" Oct 31 01:18:46.509386 kubelet[1441]: I1031 01:18:46.509325 1441 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:18:46.518063 kubelet[1441]: E1031 01:18:46.518024 1441 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:18:46.518063 kubelet[1441]: I1031 01:18:46.518054 1441 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 01:18:46.522229 kubelet[1441]: I1031 01:18:46.522192 1441 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 01:18:46.523406 kubelet[1441]: I1031 01:18:46.523353 1441 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:18:46.523618 kubelet[1441]: I1031 01:18:46.523405 1441 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.143","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:18:46.523740 kubelet[1441]: I1031 01:18:46.523629 1441 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:18:46.523740 kubelet[1441]: I1031 01:18:46.523648 1441 container_manager_linux.go:304] "Creating device plugin manager" Oct 31 01:18:46.523797 kubelet[1441]: I1031 01:18:46.523760 1441 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:18:46.526324 kubelet[1441]: I1031 01:18:46.526305 1441 kubelet.go:446] "Attempting to sync node with API server" Oct 31 01:18:46.526385 kubelet[1441]: I1031 01:18:46.526329 1441 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:18:46.526385 kubelet[1441]: I1031 01:18:46.526344 1441 kubelet.go:352] "Adding apiserver pod source" Oct 31 01:18:46.526385 kubelet[1441]: I1031 01:18:46.526353 1441 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:18:46.526491 kubelet[1441]: E1031 01:18:46.526470 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:46.526513 kubelet[1441]: E1031 01:18:46.526506 1441 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:46.530635 kubelet[1441]: I1031 01:18:46.530609 1441 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:18:46.530735 kubelet[1441]: W1031 01:18:46.530712 1441 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.143" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 31 01:18:46.530787 kubelet[1441]: E1031 01:18:46.530748 1441 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.143\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Oct 31 01:18:46.530870 kubelet[1441]: W1031 01:18:46.530843 1441 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 31 01:18:46.530910 kubelet[1441]: E1031 01:18:46.530881 1441 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Oct 31 01:18:46.531107 kubelet[1441]: I1031 01:18:46.531085 1441 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 31 01:18:46.531620 kubelet[1441]: W1031 01:18:46.531595 1441 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 01:18:46.533714 kubelet[1441]: I1031 01:18:46.533698 1441 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 01:18:46.533783 kubelet[1441]: I1031 01:18:46.533741 1441 server.go:1287] "Started kubelet" Oct 31 01:18:46.539000 audit[1441]: AVC avc: denied { mac_admin } for pid=1441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:46.539000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:46.539000 audit[1441]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006e7c80 a1=c0007181f8 a2=c0006e7c50 a3=25 items=0 ppid=1 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.539000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:46.539000 audit[1441]: AVC avc: denied { mac_admin } for pid=1441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:46.539000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:46.539000 audit[1441]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000689e60 a1=c000718210 a2=c0006e7d10 a3=25 items=0 ppid=1 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.539000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:46.540993 kubelet[1441]: I1031 01:18:46.540615 1441 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:18:46.540993 kubelet[1441]: I1031 01:18:46.540663 1441 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:18:46.540993 kubelet[1441]: I1031 01:18:46.540746 1441 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:18:46.545253 kubelet[1441]: I1031 01:18:46.545099 1441 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:18:46.546935 kubelet[1441]: E1031 01:18:46.546909 1441 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 01:18:46.546990 kubelet[1441]: E1031 01:18:46.546962 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:46.546990 kubelet[1441]: I1031 01:18:46.546982 1441 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 01:18:46.547138 kubelet[1441]: I1031 01:18:46.547118 1441 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 01:18:46.547169 kubelet[1441]: I1031 01:18:46.547152 1441 reconciler.go:26] "Reconciler: start to sync state" Oct 31 01:18:46.547447 kubelet[1441]: I1031 01:18:46.547412 1441 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:18:46.548382 kubelet[1441]: I1031 01:18:46.548346 1441 server.go:479] "Adding debug handlers to kubelet server" Oct 31 01:18:46.548983 kubelet[1441]: I1031 01:18:46.548959 1441 factory.go:221] Registration of the systemd container factory successfully Oct 31 01:18:46.549072 kubelet[1441]: I1031 01:18:46.549045 1441 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:18:46.550327 kubelet[1441]: I1031 01:18:46.550308 1441 factory.go:221] Registration of the containerd container factory successfully Oct 31 01:18:46.565394 kubelet[1441]: I1031 01:18:46.557802 1441 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:18:46.565394 kubelet[1441]: I1031 01:18:46.558077 1441 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:18:46.565394 kubelet[1441]: E1031 01:18:46.560896 1441 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.143\" not found" node="10.0.0.143" Oct 31 01:18:46.565394 kubelet[1441]: I1031 01:18:46.561183 1441 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:18:46.565394 kubelet[1441]: I1031 01:18:46.561194 1441 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:18:46.565394 kubelet[1441]: I1031 01:18:46.561210 1441 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:18:46.571000 audit[1458]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.571000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffbe150910 a2=0 a3=7fffbe1508fc items=0 ppid=1441 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:18:46.572000 audit[1464]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.572000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcbb8bdd60 a2=0 a3=7ffcbb8bdd4c items=0 ppid=1441 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:18:46.647945 kubelet[1441]: E1031 01:18:46.647924 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:46.748895 kubelet[1441]: E1031 01:18:46.748844 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:46.849045 kubelet[1441]: E1031 01:18:46.849008 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:46.882127 kubelet[1441]: I1031 01:18:46.882112 1441 policy_none.go:49] "None policy: Start" Oct 31 01:18:46.882127 kubelet[1441]: I1031 01:18:46.882136 1441 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 01:18:46.882228 kubelet[1441]: I1031 01:18:46.882148 1441 state_mem.go:35] "Initializing new in-memory state store" Oct 31 01:18:46.574000 audit[1466]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.574000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff0ca75a80 a2=0 a3=7fff0ca75a6c items=0 ppid=1441 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:46.884000 audit[1471]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.884000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffede5b7fe0 a2=0 a3=7ffede5b7fcc items=0 ppid=1441 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:46.887309 systemd[1]: Created slice kubepods.slice. Oct 31 01:18:46.891668 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 01:18:46.894282 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 01:18:46.899000 audit[1441]: AVC avc: denied { mac_admin } for pid=1441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:46.899000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:18:46.899000 audit[1441]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f11ef0 a1=c000059668 a2=c000f11ec0 a3=25 items=0 ppid=1 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.899000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:18:46.901205 kubelet[1441]: I1031 01:18:46.900965 1441 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 31 01:18:46.901205 kubelet[1441]: I1031 01:18:46.901059 1441 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 31 01:18:46.901205 kubelet[1441]: I1031 01:18:46.901173 1441 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:18:46.901283 kubelet[1441]: I1031 01:18:46.901190 1441 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:18:46.901713 kubelet[1441]: I1031 01:18:46.901472 1441 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:18:46.902539 kubelet[1441]: E1031 01:18:46.902518 1441 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:18:46.902609 kubelet[1441]: E1031 01:18:46.902568 1441 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.143\" not found" Oct 31 01:18:46.919000 audit[1476]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.919000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd28167cc0 a2=0 a3=7ffd28167cac items=0 ppid=1441 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 31 01:18:46.920007 kubelet[1441]: I1031 01:18:46.919982 1441 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 31 01:18:46.920000 audit[1477]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:46.920000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeff554150 a2=0 a3=7ffeff55413c items=0 ppid=1441 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:18:46.920000 audit[1478]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.920000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcb85e040 a2=0 a3=10e3 items=0 ppid=1441 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:18:46.920979 kubelet[1441]: I1031 01:18:46.920876 1441 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 31 01:18:46.920979 kubelet[1441]: I1031 01:18:46.920897 1441 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 31 01:18:46.920979 kubelet[1441]: I1031 01:18:46.920940 1441 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:18:46.920979 kubelet[1441]: I1031 01:18:46.920948 1441 kubelet.go:2382] "Starting kubelet main sync loop" Oct 31 01:18:46.921000 audit[1479]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.921000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffccc5cb1a0 a2=0 a3=7ffccc5cb18c items=0 ppid=1441 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:18:46.921000 audit[1480]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:46.921000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe40115020 a2=0 a3=7ffe4011500c items=0 ppid=1441 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:18:46.921000 audit[1481]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:46.921000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9b3dbd70 a2=0 a3=7ffe9b3dbd5c items=0 ppid=1441 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:18:46.922000 audit[1482]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:46.922000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd1d8c4350 a2=0 a3=7ffd1d8c433c items=0 ppid=1441 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:18:46.923000 audit[1483]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:46.923000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe049e2490 a2=0 a3=7ffe049e247c items=0 ppid=1441 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:46.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:18:47.003800 kubelet[1441]: I1031 01:18:47.002968 1441 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.143" Oct 31 01:18:47.007819 kubelet[1441]: I1031 01:18:47.007778 1441 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.143" Oct 31 01:18:47.007819 kubelet[1441]: E1031 01:18:47.007809 1441 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.143\": node \"10.0.0.143\" not found" Oct 31 01:18:47.019873 kubelet[1441]: E1031 01:18:47.019843 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:47.028235 sudo[1334]: pam_unix(sudo:session): session closed for user root Oct 31 01:18:47.026000 audit[1334]: USER_END pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:47.027000 audit[1334]: CRED_DISP pid=1334 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:18:47.029552 sshd[1330]: pam_unix(sshd:session): session closed for user core Oct 31 01:18:47.029000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.029000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:18:47.031535 systemd[1]: sshd@6-10.0.0.143:22-10.0.0.1:50750.service: Deactivated successfully. Oct 31 01:18:47.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:50750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:18:47.032300 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 01:18:47.032840 systemd-logind[1187]: Session 7 logged out. Waiting for processes to exit. Oct 31 01:18:47.033465 systemd-logind[1187]: Removed session 7. Oct 31 01:18:47.120768 kubelet[1441]: E1031 01:18:47.120738 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:47.221929 kubelet[1441]: E1031 01:18:47.221875 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:47.323035 kubelet[1441]: E1031 01:18:47.322956 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:47.423964 kubelet[1441]: E1031 01:18:47.423907 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:47.486803 kubelet[1441]: I1031 01:18:47.486763 1441 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 31 01:18:47.486978 kubelet[1441]: W1031 01:18:47.486958 1441 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Oct 31 01:18:47.486978 kubelet[1441]: W1031 01:18:47.486971 1441 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Oct 31 01:18:47.524484 kubelet[1441]: E1031 01:18:47.524441 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:47.526607 kubelet[1441]: E1031 01:18:47.526588 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:47.624841 kubelet[1441]: E1031 01:18:47.624756 1441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Oct 31 01:18:47.727439 kubelet[1441]: I1031 01:18:47.727414 1441 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 31 01:18:47.727790 env[1204]: time="2025-10-31T01:18:47.727752152Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 01:18:47.728026 kubelet[1441]: I1031 01:18:47.727884 1441 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 31 01:18:48.527662 kubelet[1441]: I1031 01:18:48.527624 1441 apiserver.go:52] "Watching apiserver" Oct 31 01:18:48.527662 kubelet[1441]: E1031 01:18:48.527635 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:48.529730 kubelet[1441]: E1031 01:18:48.529692 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:18:48.535054 systemd[1]: Created slice kubepods-besteffort-podb49dcf66_0598_4e12_91eb_7e63dea8571a.slice. Oct 31 01:18:48.545056 systemd[1]: Created slice kubepods-besteffort-pod79fcfd02_8119_4605_b1a2_f50387a94a49.slice. Oct 31 01:18:48.547633 kubelet[1441]: I1031 01:18:48.547609 1441 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 01:18:48.556715 kubelet[1441]: I1031 01:18:48.556678 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-cni-log-dir\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.556784 kubelet[1441]: I1031 01:18:48.556730 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-policysync\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.556784 kubelet[1441]: I1031 01:18:48.556758 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-var-lib-calico\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.556853 kubelet[1441]: I1031 01:18:48.556793 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-xtables-lock\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.556853 kubelet[1441]: I1031 01:18:48.556834 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/88903394-2d14-4910-8460-2f09dba7d264-kubelet-dir\") pod \"csi-node-driver-6w5z2\" (UID: \"88903394-2d14-4910-8460-2f09dba7d264\") " pod="calico-system/csi-node-driver-6w5z2" Oct 31 01:18:48.556913 kubelet[1441]: I1031 01:18:48.556859 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-snz7k\" (UniqueName: \"kubernetes.io/projected/88903394-2d14-4910-8460-2f09dba7d264-kube-api-access-snz7k\") pod \"csi-node-driver-6w5z2\" (UID: \"88903394-2d14-4910-8460-2f09dba7d264\") " pod="calico-system/csi-node-driver-6w5z2" Oct 31 01:18:48.556913 kubelet[1441]: I1031 01:18:48.556888 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/79fcfd02-8119-4605-b1a2-f50387a94a49-lib-modules\") pod \"kube-proxy-rt8vn\" (UID: \"79fcfd02-8119-4605-b1a2-f50387a94a49\") " pod="kube-system/kube-proxy-rt8vn" Oct 31 01:18:48.556913 kubelet[1441]: I1031 01:18:48.556906 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b49dcf66-0598-4e12-91eb-7e63dea8571a-tigera-ca-bundle\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.557000 kubelet[1441]: I1031 01:18:48.556926 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-var-run-calico\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.557000 kubelet[1441]: I1031 01:18:48.556945 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/88903394-2d14-4910-8460-2f09dba7d264-varrun\") pod \"csi-node-driver-6w5z2\" (UID: \"88903394-2d14-4910-8460-2f09dba7d264\") " pod="calico-system/csi-node-driver-6w5z2" Oct 31 01:18:48.557000 kubelet[1441]: I1031 01:18:48.556974 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-cni-net-dir\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.557096 kubelet[1441]: I1031 01:18:48.557011 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-flexvol-driver-host\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.557096 kubelet[1441]: I1031 01:18:48.557045 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-cni-bin-dir\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.557096 kubelet[1441]: I1031 01:18:48.557086 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/88903394-2d14-4910-8460-2f09dba7d264-registration-dir\") pod \"csi-node-driver-6w5z2\" (UID: \"88903394-2d14-4910-8460-2f09dba7d264\") " pod="calico-system/csi-node-driver-6w5z2" Oct 31 01:18:48.557221 kubelet[1441]: I1031 01:18:48.557178 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/88903394-2d14-4910-8460-2f09dba7d264-socket-dir\") pod \"csi-node-driver-6w5z2\" (UID: \"88903394-2d14-4910-8460-2f09dba7d264\") " pod="calico-system/csi-node-driver-6w5z2" Oct 31 01:18:48.557258 kubelet[1441]: I1031 01:18:48.557225 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nz8sl\" (UniqueName: \"kubernetes.io/projected/79fcfd02-8119-4605-b1a2-f50387a94a49-kube-api-access-nz8sl\") pod \"kube-proxy-rt8vn\" (UID: \"79fcfd02-8119-4605-b1a2-f50387a94a49\") " pod="kube-system/kube-proxy-rt8vn" Oct 31 01:18:48.557258 kubelet[1441]: I1031 01:18:48.557244 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b49dcf66-0598-4e12-91eb-7e63dea8571a-node-certs\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.557327 kubelet[1441]: I1031 01:18:48.557267 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s8nnm\" (UniqueName: \"kubernetes.io/projected/b49dcf66-0598-4e12-91eb-7e63dea8571a-kube-api-access-s8nnm\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.557327 kubelet[1441]: I1031 01:18:48.557309 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/79fcfd02-8119-4605-b1a2-f50387a94a49-kube-proxy\") pod \"kube-proxy-rt8vn\" (UID: \"79fcfd02-8119-4605-b1a2-f50387a94a49\") " pod="kube-system/kube-proxy-rt8vn" Oct 31 01:18:48.557419 kubelet[1441]: I1031 01:18:48.557362 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/79fcfd02-8119-4605-b1a2-f50387a94a49-xtables-lock\") pod \"kube-proxy-rt8vn\" (UID: \"79fcfd02-8119-4605-b1a2-f50387a94a49\") " pod="kube-system/kube-proxy-rt8vn" Oct 31 01:18:48.557419 kubelet[1441]: I1031 01:18:48.557403 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b49dcf66-0598-4e12-91eb-7e63dea8571a-lib-modules\") pod \"calico-node-pg9st\" (UID: \"b49dcf66-0598-4e12-91eb-7e63dea8571a\") " pod="calico-system/calico-node-pg9st" Oct 31 01:18:48.659003 kubelet[1441]: I1031 01:18:48.658965 1441 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 01:18:48.659856 kubelet[1441]: E1031 01:18:48.659838 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:48.659928 kubelet[1441]: W1031 01:18:48.659856 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:48.659928 kubelet[1441]: E1031 01:18:48.659888 1441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:48.661794 kubelet[1441]: E1031 01:18:48.661779 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:48.661794 kubelet[1441]: W1031 01:18:48.661792 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:48.661899 kubelet[1441]: E1031 01:18:48.661804 1441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:49.086533 kubelet[1441]: E1031 01:18:49.086495 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:49.086533 kubelet[1441]: W1031 01:18:49.086517 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:49.086691 kubelet[1441]: E1031 01:18:49.086539 1441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:49.087133 kubelet[1441]: E1031 01:18:49.087118 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:49.087200 kubelet[1441]: W1031 01:18:49.087132 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:49.087200 kubelet[1441]: E1031 01:18:49.087147 1441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:49.094556 kubelet[1441]: E1031 01:18:49.094542 1441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:18:49.094556 kubelet[1441]: W1031 01:18:49.094553 1441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:18:49.094642 kubelet[1441]: E1031 01:18:49.094563 1441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:18:49.143261 kubelet[1441]: E1031 01:18:49.143231 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:49.143834 env[1204]: time="2025-10-31T01:18:49.143799017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pg9st,Uid:b49dcf66-0598-4e12-91eb-7e63dea8571a,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:49.146934 kubelet[1441]: E1031 01:18:49.146915 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:49.147218 env[1204]: time="2025-10-31T01:18:49.147195723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rt8vn,Uid:79fcfd02-8119-4605-b1a2-f50387a94a49,Namespace:kube-system,Attempt:0,}" Oct 31 01:18:49.528305 kubelet[1441]: E1031 01:18:49.528213 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:49.922169 kubelet[1441]: E1031 01:18:49.922067 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:18:50.490870 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount140906965.mount: Deactivated successfully. Oct 31 01:18:50.498023 env[1204]: time="2025-10-31T01:18:50.497983768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.501057 env[1204]: time="2025-10-31T01:18:50.501029791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.502935 env[1204]: time="2025-10-31T01:18:50.502910757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.504040 env[1204]: time="2025-10-31T01:18:50.503984166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.505107 env[1204]: time="2025-10-31T01:18:50.505083659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.506416 env[1204]: time="2025-10-31T01:18:50.506383188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.507756 env[1204]: time="2025-10-31T01:18:50.507729521Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.509063 env[1204]: time="2025-10-31T01:18:50.509025068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:50.528533 kubelet[1441]: E1031 01:18:50.528473 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:50.529717 env[1204]: time="2025-10-31T01:18:50.529670600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:50.529717 env[1204]: time="2025-10-31T01:18:50.529701691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:50.529854 env[1204]: time="2025-10-31T01:18:50.529813075Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:50.530076 env[1204]: time="2025-10-31T01:18:50.530031504Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9dfa498153e607fc17a7d27713b10ac3074d2980de7278291a240392824bd68b pid=1504 runtime=io.containerd.runc.v2 Oct 31 01:18:50.535581 env[1204]: time="2025-10-31T01:18:50.535530393Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:18:50.535581 env[1204]: time="2025-10-31T01:18:50.535559310Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:18:50.535756 env[1204]: time="2025-10-31T01:18:50.535720027Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:18:50.536005 env[1204]: time="2025-10-31T01:18:50.535913957Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192 pid=1526 runtime=io.containerd.runc.v2 Oct 31 01:18:50.541235 systemd[1]: Started cri-containerd-9dfa498153e607fc17a7d27713b10ac3074d2980de7278291a240392824bd68b.scope. Oct 31 01:18:50.548011 systemd[1]: Started cri-containerd-726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192.scope. Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.552909 kernel: kauditd_printk_skb: 243 callbacks suppressed Oct 31 01:18:50.552978 kernel: audit: type=1400 audit(1761873530.549:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563899 kernel: audit: type=1400 audit(1761873530.549:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563953 kernel: audit: type=1400 audit(1761873530.549:407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.574424 kernel: audit: type=1400 audit(1761873530.549:408): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.574484 kernel: audit: type=1400 audit(1761873530.549:409): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.579433 kernel: audit: type=1400 audit(1761873530.549:410): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.589420 kernel: audit: type=1400 audit(1761873530.549:411): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.589480 kernel: audit: type=1400 audit(1761873530.549:412): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.594403 kernel: audit: type=1400 audit(1761873530.549:413): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.599330 kernel: audit: type=1400 audit(1761873530.558:414): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit: BPF prog-id=58 op=LOAD Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964666134393831353365363037666331376137643237373133623130 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964666134393831353365363037666331376137643237373133623130 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.558000 audit: BPF prog-id=59 op=LOAD Oct 31 01:18:50.558000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000340590 items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964666134393831353365363037666331376137643237373133623130 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.563000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.568000 audit: BPF prog-id=60 op=LOAD Oct 31 01:18:50.563000 audit: BPF prog-id=61 op=LOAD Oct 31 01:18:50.563000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003405d8 items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964666134393831353365363037666331376137643237373133623130 Oct 31 01:18:50.569000 audit: BPF prog-id=61 op=UNLOAD Oct 31 01:18:50.569000 audit: BPF prog-id=59 op=UNLOAD Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit: BPF prog-id=62 op=LOAD Oct 31 01:18:50.569000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1526 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363036326539383364393236343738633338356366363237343937 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=1526 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363036326539383364393236343738633338356366363237343937 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.569000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003409e8 items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964666134393831353365363037666331376137643237373133623130 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit: BPF prog-id=63 op=LOAD Oct 31 01:18:50.603000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c0000ffe80 items=0 ppid=1526 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363036326539383364393236343738633338356366363237343937 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit: BPF prog-id=64 op=LOAD Oct 31 01:18:50.603000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0000ffec8 items=0 ppid=1526 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363036326539383364393236343738633338356366363237343937 Oct 31 01:18:50.603000 audit: BPF prog-id=64 op=UNLOAD Oct 31 01:18:50.603000 audit: BPF prog-id=63 op=UNLOAD Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:50.603000 audit: BPF prog-id=65 op=LOAD Oct 31 01:18:50.603000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0003582d8 items=0 ppid=1526 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:50.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363036326539383364393236343738633338356366363237343937 Oct 31 01:18:50.615887 env[1204]: time="2025-10-31T01:18:50.615845107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pg9st,Uid:b49dcf66-0598-4e12-91eb-7e63dea8571a,Namespace:calico-system,Attempt:0,} returns sandbox id \"726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192\"" Oct 31 01:18:50.616696 kubelet[1441]: E1031 01:18:50.616674 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:50.617758 env[1204]: time="2025-10-31T01:18:50.617713182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 01:18:50.620976 env[1204]: time="2025-10-31T01:18:50.620809961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rt8vn,Uid:79fcfd02-8119-4605-b1a2-f50387a94a49,Namespace:kube-system,Attempt:0,} returns sandbox id \"9dfa498153e607fc17a7d27713b10ac3074d2980de7278291a240392824bd68b\"" Oct 31 01:18:50.621246 kubelet[1441]: E1031 01:18:50.621231 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:51.528929 kubelet[1441]: E1031 01:18:51.528859 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:51.911159 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2914594572.mount: Deactivated successfully. Oct 31 01:18:51.921973 kubelet[1441]: E1031 01:18:51.921935 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:18:52.016481 env[1204]: time="2025-10-31T01:18:52.016426687Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:52.018340 env[1204]: time="2025-10-31T01:18:52.018296908Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:52.020310 env[1204]: time="2025-10-31T01:18:52.020269925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:52.021602 env[1204]: time="2025-10-31T01:18:52.021558927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:52.021970 env[1204]: time="2025-10-31T01:18:52.021937004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 01:18:52.022950 env[1204]: time="2025-10-31T01:18:52.022924075Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Oct 31 01:18:52.023973 env[1204]: time="2025-10-31T01:18:52.023938786Z" level=info msg="CreateContainer within sandbox \"726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 01:18:52.035646 env[1204]: time="2025-10-31T01:18:52.035612263Z" level=info msg="CreateContainer within sandbox \"726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5e5c45c3afe934a23bb95450a5151df4c7ecbcbf7f416549f30582c7703c01b8\"" Oct 31 01:18:52.036109 env[1204]: time="2025-10-31T01:18:52.036087437Z" level=info msg="StartContainer for \"5e5c45c3afe934a23bb95450a5151df4c7ecbcbf7f416549f30582c7703c01b8\"" Oct 31 01:18:52.049315 systemd[1]: Started cri-containerd-5e5c45c3afe934a23bb95450a5151df4c7ecbcbf7f416549f30582c7703c01b8.scope. Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8c840fa488 items=0 ppid=1526 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565356334356333616665393334613233626239353435306135313531 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit: BPF prog-id=66 op=LOAD Oct 31 01:18:52.060000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e1ba8 items=0 ppid=1526 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565356334356333616665393334613233626239353435306135313531 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit: BPF prog-id=67 op=LOAD Oct 31 01:18:52.060000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e1bf8 items=0 ppid=1526 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565356334356333616665393334613233626239353435306135313531 Oct 31 01:18:52.060000 audit: BPF prog-id=67 op=UNLOAD Oct 31 01:18:52.060000 audit: BPF prog-id=66 op=UNLOAD Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:52.060000 audit: BPF prog-id=68 op=LOAD Oct 31 01:18:52.060000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e1c88 items=0 ppid=1526 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:52.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565356334356333616665393334613233626239353435306135313531 Oct 31 01:18:52.073094 env[1204]: time="2025-10-31T01:18:52.073048616Z" level=info msg="StartContainer for \"5e5c45c3afe934a23bb95450a5151df4c7ecbcbf7f416549f30582c7703c01b8\" returns successfully" Oct 31 01:18:52.081988 systemd[1]: cri-containerd-5e5c45c3afe934a23bb95450a5151df4c7ecbcbf7f416549f30582c7703c01b8.scope: Deactivated successfully. Oct 31 01:18:52.086000 audit: BPF prog-id=68 op=UNLOAD Oct 31 01:18:52.160641 env[1204]: time="2025-10-31T01:18:52.160594788Z" level=info msg="shim disconnected" id=5e5c45c3afe934a23bb95450a5151df4c7ecbcbf7f416549f30582c7703c01b8 Oct 31 01:18:52.160641 env[1204]: time="2025-10-31T01:18:52.160640744Z" level=warning msg="cleaning up after shim disconnected" id=5e5c45c3afe934a23bb95450a5151df4c7ecbcbf7f416549f30582c7703c01b8 namespace=k8s.io Oct 31 01:18:52.160841 env[1204]: time="2025-10-31T01:18:52.160650180Z" level=info msg="cleaning up dead shim" Oct 31 01:18:52.167547 env[1204]: time="2025-10-31T01:18:52.166465788Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:18:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1626 runtime=io.containerd.runc.v2\n" Oct 31 01:18:52.529410 kubelet[1441]: E1031 01:18:52.529288 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:52.931108 kubelet[1441]: E1031 01:18:52.931002 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:53.124420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1886298568.mount: Deactivated successfully. Oct 31 01:18:53.530159 kubelet[1441]: E1031 01:18:53.530097 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:53.738401 env[1204]: time="2025-10-31T01:18:53.738292757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:53.740125 env[1204]: time="2025-10-31T01:18:53.740085059Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:53.741877 env[1204]: time="2025-10-31T01:18:53.741829200Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:53.743148 env[1204]: time="2025-10-31T01:18:53.743123664Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:53.743513 env[1204]: time="2025-10-31T01:18:53.743465290Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Oct 31 01:18:53.744806 env[1204]: time="2025-10-31T01:18:53.744781231Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 01:18:53.746020 env[1204]: time="2025-10-31T01:18:53.745966763Z" level=info msg="CreateContainer within sandbox \"9dfa498153e607fc17a7d27713b10ac3074d2980de7278291a240392824bd68b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 01:18:53.758457 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2184975863.mount: Deactivated successfully. Oct 31 01:18:53.760519 env[1204]: time="2025-10-31T01:18:53.760474358Z" level=info msg="CreateContainer within sandbox \"9dfa498153e607fc17a7d27713b10ac3074d2980de7278291a240392824bd68b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f25a58a9e29be5c5ea52f2ed6224084d713ee7bf99bf7aacd9c79a0a16e623bd\"" Oct 31 01:18:53.760876 env[1204]: time="2025-10-31T01:18:53.760840535Z" level=info msg="StartContainer for \"f25a58a9e29be5c5ea52f2ed6224084d713ee7bf99bf7aacd9c79a0a16e623bd\"" Oct 31 01:18:53.778877 systemd[1]: Started cri-containerd-f25a58a9e29be5c5ea52f2ed6224084d713ee7bf99bf7aacd9c79a0a16e623bd.scope. Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f30ea680088 items=0 ppid=1504 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632356135386139653239626535633565613532663265643632323430 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.787000 audit: BPF prog-id=69 op=LOAD Oct 31 01:18:53.787000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000381f68 items=0 ppid=1504 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632356135386139653239626535633565613532663265643632323430 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.788000 audit: BPF prog-id=70 op=LOAD Oct 31 01:18:53.788000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000381fb8 items=0 ppid=1504 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632356135386139653239626535633565613532663265643632323430 Oct 31 01:18:53.789000 audit: BPF prog-id=70 op=UNLOAD Oct 31 01:18:53.789000 audit: BPF prog-id=69 op=UNLOAD Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:53.789000 audit: BPF prog-id=71 op=LOAD Oct 31 01:18:53.789000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f0048 items=0 ppid=1504 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632356135386139653239626535633565613532663265643632323430 Oct 31 01:18:53.805543 env[1204]: time="2025-10-31T01:18:53.805494565Z" level=info msg="StartContainer for \"f25a58a9e29be5c5ea52f2ed6224084d713ee7bf99bf7aacd9c79a0a16e623bd\" returns successfully" Oct 31 01:18:53.894000 audit[1709]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:53.894000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3a903c10 a2=0 a3=7fff3a903bfc items=0 ppid=1660 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:18:53.899000 audit[1711]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:53.899000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd82de4c60 a2=0 a3=7ffd82de4c4c items=0 ppid=1660 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:18:53.900000 audit[1712]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:53.900000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd4156910 a2=0 a3=7ffcd41568fc items=0 ppid=1660 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:18:53.901000 audit[1713]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:53.901000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2ba9ee80 a2=0 a3=7ffd2ba9ee6c items=0 ppid=1660 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:18:53.901000 audit[1714]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:53.901000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb6b04ef0 a2=0 a3=7ffeb6b04edc items=0 ppid=1660 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:18:53.902000 audit[1716]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:53.902000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb7d76740 a2=0 a3=7ffcb7d7672c items=0 ppid=1660 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:18:53.922104 kubelet[1441]: E1031 01:18:53.922075 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:18:53.934090 kubelet[1441]: E1031 01:18:53.934065 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:53.941215 kubelet[1441]: I1031 01:18:53.941132 1441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rt8vn" podStartSLOduration=3.818065775 podStartE2EDuration="6.941114363s" podCreationTimestamp="2025-10-31 01:18:47 +0000 UTC" firstStartedPulling="2025-10-31 01:18:50.621546741 +0000 UTC m=+4.626535259" lastFinishedPulling="2025-10-31 01:18:53.74459531 +0000 UTC m=+7.749583847" observedRunningTime="2025-10-31 01:18:53.940899888 +0000 UTC m=+7.945888424" watchObservedRunningTime="2025-10-31 01:18:53.941114363 +0000 UTC m=+7.946102879" Oct 31 01:18:53.998000 audit[1717]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:53.998000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0ef34630 a2=0 a3=7ffd0ef3461c items=0 ppid=1660 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:53.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:18:54.001000 audit[1719]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.001000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd4c924500 a2=0 a3=7ffd4c9244ec items=0 ppid=1660 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 31 01:18:54.003000 audit[1722]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.003000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1a7c6830 a2=0 a3=7ffd1a7c681c items=0 ppid=1660 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 31 01:18:54.004000 audit[1723]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.004000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff606c7f80 a2=0 a3=7fff606c7f6c items=0 ppid=1660 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:18:54.006000 audit[1725]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.006000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf90e3320 a2=0 a3=7ffcf90e330c items=0 ppid=1660 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:18:54.007000 audit[1726]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.007000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff055b0ba0 a2=0 a3=7fff055b0b8c items=0 ppid=1660 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:18:54.009000 audit[1728]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.009000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc25af98f0 a2=0 a3=7ffc25af98dc items=0 ppid=1660 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:18:54.012000 audit[1731]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.012000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcd2f3d8e0 a2=0 a3=7ffcd2f3d8cc items=0 ppid=1660 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 31 01:18:54.013000 audit[1732]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.013000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffae7da0b0 a2=0 a3=7fffae7da09c items=0 ppid=1660 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:18:54.015000 audit[1734]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.015000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff306fce80 a2=0 a3=7fff306fce6c items=0 ppid=1660 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:18:54.016000 audit[1735]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.016000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9b8cd040 a2=0 a3=7fff9b8cd02c items=0 ppid=1660 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:18:54.018000 audit[1737]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.018000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0de6a9d0 a2=0 a3=7fff0de6a9bc items=0 ppid=1660 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:18:54.020000 audit[1740]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.020000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4c571140 a2=0 a3=7ffc4c57112c items=0 ppid=1660 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:18:54.023000 audit[1743]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.023000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce3aa8b60 a2=0 a3=7ffce3aa8b4c items=0 ppid=1660 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:18:54.024000 audit[1744]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.024000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd5185e940 a2=0 a3=7ffd5185e92c items=0 ppid=1660 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:18:54.025000 audit[1746]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.025000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdcb042230 a2=0 a3=7ffdcb04221c items=0 ppid=1660 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:54.045000 audit[1750]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.045000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc00c601f0 a2=0 a3=7ffc00c601dc items=0 ppid=1660 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:54.046000 audit[1751]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.046000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd593e25c0 a2=0 a3=7ffd593e25ac items=0 ppid=1660 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:18:54.048000 audit[1753]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:18:54.048000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffff23d8930 a2=0 a3=7ffff23d891c items=0 ppid=1660 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:18:54.066000 audit[1759]: NETFILTER_CFG table=filter:39 family=2 entries=12 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:54.066000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fffe28f55b0 a2=0 a3=7fffe28f559c items=0 ppid=1660 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:54.082000 audit[1759]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:54.082000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffe28f55b0 a2=0 a3=0 items=0 ppid=1660 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:54.083000 audit[1766]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.083000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5e8ed210 a2=0 a3=7fff5e8ed1fc items=0 ppid=1660 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:18:54.085000 audit[1768]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.085000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe50d00350 a2=0 a3=7ffe50d0033c items=0 ppid=1660 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 31 01:18:54.088000 audit[1771]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.088000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff28318690 a2=0 a3=7fff2831867c items=0 ppid=1660 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 31 01:18:54.089000 audit[1772]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.089000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaef472f0 a2=0 a3=7fffaef472dc items=0 ppid=1660 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:18:54.090000 audit[1774]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.090000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff99820880 a2=0 a3=7fff9982086c items=0 ppid=1660 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:18:54.091000 audit[1775]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.091000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff680c0050 a2=0 a3=7fff680c003c items=0 ppid=1660 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.091000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:18:54.092000 audit[1777]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.092000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec2db12e0 a2=0 a3=7ffec2db12cc items=0 ppid=1660 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 31 01:18:54.095000 audit[1780]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.095000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd314ae750 a2=0 a3=7ffd314ae73c items=0 ppid=1660 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:18:54.096000 audit[1781]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.096000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26df09b0 a2=0 a3=7ffd26df099c items=0 ppid=1660 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:18:54.098000 audit[1783]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.098000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc3c41c40 a2=0 a3=7fffc3c41c2c items=0 ppid=1660 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:18:54.102000 audit[1784]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.102000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc781e5f20 a2=0 a3=7ffc781e5f0c items=0 ppid=1660 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:18:54.103000 audit[1786]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.103000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3f653500 a2=0 a3=7ffe3f6534ec items=0 ppid=1660 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:18:54.106000 audit[1789]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.106000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4173f8c0 a2=0 a3=7fff4173f8ac items=0 ppid=1660 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:18:54.109000 audit[1792]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.109000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccd1c1980 a2=0 a3=7ffccd1c196c items=0 ppid=1660 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 31 01:18:54.109000 audit[1793]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.109000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3c4a9da0 a2=0 a3=7ffd3c4a9d8c items=0 ppid=1660 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:18:54.111000 audit[1795]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.111000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc04fb30c0 a2=0 a3=7ffc04fb30ac items=0 ppid=1660 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:54.114000 audit[1798]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.114000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff4a7047e0 a2=0 a3=7fff4a7047cc items=0 ppid=1660 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:18:54.115000 audit[1799]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.115000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff96716da0 a2=0 a3=7fff96716d8c items=0 ppid=1660 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:18:54.116000 audit[1801]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.116000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcac9075b0 a2=0 a3=7ffcac90759c items=0 ppid=1660 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:18:54.117000 audit[1802]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.117000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8ffeebc0 a2=0 a3=7fff8ffeebac items=0 ppid=1660 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:18:54.119000 audit[1804]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.119000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffcff22320 a2=0 a3=7fffcff2230c items=0 ppid=1660 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:54.122000 audit[1807]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:18:54.122000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe49b85a00 a2=0 a3=7ffe49b859ec items=0 ppid=1660 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:18:54.124000 audit[1809]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:18:54.124000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffcdaad2420 a2=0 a3=7ffcdaad240c items=0 ppid=1660 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.124000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:54.124000 audit[1809]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:18:54.124000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcdaad2420 a2=0 a3=7ffcdaad240c items=0 ppid=1660 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:54.124000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:54.530593 kubelet[1441]: E1031 01:18:54.530491 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:54.934831 kubelet[1441]: E1031 01:18:54.934743 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:55.531466 kubelet[1441]: E1031 01:18:55.531408 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:55.921838 kubelet[1441]: E1031 01:18:55.921700 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:18:56.033000 audit[1811]: NETFILTER_CFG table=filter:65 family=2 entries=22 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:56.036589 kernel: kauditd_printk_skb: 344 callbacks suppressed Oct 31 01:18:56.036650 kernel: audit: type=1325 audit(1761873536.033:505): table=filter:65 family=2 entries=22 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:56.041376 kernel: audit: type=1300 audit(1761873536.033:505): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd4379c700 a2=0 a3=7ffd4379c6ec items=0 ppid=1660 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.033000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd4379c700 a2=0 a3=7ffd4379c6ec items=0 ppid=1660 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:56.053204 kernel: audit: type=1327 audit(1761873536.033:505): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:56.054000 audit[1811]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:56.054000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4379c700 a2=0 a3=0 items=0 ppid=1660 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.066463 kernel: audit: type=1325 audit(1761873536.054:506): table=nat:66 family=2 entries=12 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:56.066492 kernel: audit: type=1300 audit(1761873536.054:506): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4379c700 a2=0 a3=0 items=0 ppid=1660 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:56.066509 kernel: audit: type=1327 audit(1761873536.054:506): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:56.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:56.532325 kubelet[1441]: E1031 01:18:56.532280 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:57.194000 audit[1813]: NETFILTER_CFG table=filter:67 family=2 entries=21 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.194000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd52396e40 a2=0 a3=7ffd52396e2c items=0 ppid=1660 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.210625 kernel: audit: type=1325 audit(1761873537.194:507): table=filter:67 family=2 entries=21 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.210747 kernel: audit: type=1300 audit(1761873537.194:507): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd52396e40 a2=0 a3=7ffd52396e2c items=0 ppid=1660 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.210769 kernel: audit: type=1327 audit(1761873537.194:507): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.216000 audit[1813]: NETFILTER_CFG table=nat:68 family=2 entries=19 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.216000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd52396e40 a2=0 a3=7ffd52396e2c items=0 ppid=1660 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.221399 kernel: audit: type=1325 audit(1761873537.216:508): table=nat:68 family=2 entries=19 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.533318 kubelet[1441]: E1031 01:18:57.533204 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:57.842000 audit[1815]: NETFILTER_CFG table=filter:69 family=2 entries=20 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.842000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcb732e0b0 a2=0 a3=7ffcb732e09c items=0 ppid=1660 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.847000 audit[1815]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:57.847000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb732e0b0 a2=0 a3=0 items=0 ppid=1660 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:57.852232 env[1204]: time="2025-10-31T01:18:57.852187614Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:57.854019 env[1204]: time="2025-10-31T01:18:57.853970348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:57.855929 env[1204]: time="2025-10-31T01:18:57.855895755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:57.858010 env[1204]: time="2025-10-31T01:18:57.857977640Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 01:18:57.858746 env[1204]: time="2025-10-31T01:18:57.858713895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:18:57.860020 env[1204]: time="2025-10-31T01:18:57.859995973Z" level=info msg="CreateContainer within sandbox \"726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 01:18:57.874682 env[1204]: time="2025-10-31T01:18:57.874647532Z" level=info msg="CreateContainer within sandbox \"726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869\"" Oct 31 01:18:57.875078 env[1204]: time="2025-10-31T01:18:57.875044323Z" level=info msg="StartContainer for \"86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869\"" Oct 31 01:18:57.891191 systemd[1]: Started cri-containerd-86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869.scope. Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0ca82f9de8 items=0 ppid=1526 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373139616162396161366463326639643239333861373836643136 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.901000 audit: BPF prog-id=72 op=LOAD Oct 31 01:18:57.901000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000300578 items=0 ppid=1526 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373139616162396161366463326639643239333861373836643136 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit: BPF prog-id=73 op=LOAD Oct 31 01:18:57.902000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003005c8 items=0 ppid=1526 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373139616162396161366463326639643239333861373836643136 Oct 31 01:18:57.902000 audit: BPF prog-id=73 op=UNLOAD Oct 31 01:18:57.902000 audit: BPF prog-id=72 op=UNLOAD Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:18:57.902000 audit: BPF prog-id=74 op=LOAD Oct 31 01:18:57.902000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000300658 items=0 ppid=1526 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:57.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836373139616162396161366463326639643239333861373836643136 Oct 31 01:18:57.915160 env[1204]: time="2025-10-31T01:18:57.915098935Z" level=info msg="StartContainer for \"86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869\" returns successfully" Oct 31 01:18:57.921268 kubelet[1441]: E1031 01:18:57.921236 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:18:57.940454 kubelet[1441]: E1031 01:18:57.940424 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:58.533312 kubelet[1441]: E1031 01:18:58.533269 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:58.748000 audit[1853]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:58.748000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff33ad3490 a2=0 a3=7fff33ad347c items=0 ppid=1660 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:58.754000 audit[1853]: NETFILTER_CFG table=nat:72 family=2 entries=14 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:58.754000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff33ad3490 a2=0 a3=0 items=0 ppid=1660 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:58.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:58.857699 env[1204]: time="2025-10-31T01:18:58.857569219Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:18:58.859046 systemd[1]: cri-containerd-86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869.scope: Deactivated successfully. Oct 31 01:18:58.862000 audit: BPF prog-id=74 op=UNLOAD Oct 31 01:18:58.873895 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869-rootfs.mount: Deactivated successfully. Oct 31 01:18:58.920529 kubelet[1441]: I1031 01:18:58.920497 1441 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 31 01:18:58.941864 kubelet[1441]: E1031 01:18:58.941841 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:59.534077 kubelet[1441]: E1031 01:18:59.534034 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:18:59.555130 env[1204]: time="2025-10-31T01:18:59.555085572Z" level=info msg="shim disconnected" id=86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869 Oct 31 01:18:59.555209 env[1204]: time="2025-10-31T01:18:59.555133248Z" level=warning msg="cleaning up after shim disconnected" id=86719aab9aa6dc2f9d2938a786d169c17e4818add1c5348bc3b8f00fc44d7869 namespace=k8s.io Oct 31 01:18:59.555209 env[1204]: time="2025-10-31T01:18:59.555143359Z" level=info msg="cleaning up dead shim" Oct 31 01:18:59.560807 env[1204]: time="2025-10-31T01:18:59.560773115Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:18:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1868 runtime=io.containerd.runc.v2\n" Oct 31 01:18:59.746000 audit[1881]: NETFILTER_CFG table=filter:73 family=2 entries=17 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:59.746000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffceaabda40 a2=0 a3=7ffceaabda2c items=0 ppid=1660 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:59.754000 audit[1881]: NETFILTER_CFG table=nat:74 family=2 entries=35 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:18:59.754000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffceaabda40 a2=0 a3=7ffceaabda2c items=0 ppid=1660 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:18:59.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:18:59.925316 systemd[1]: Created slice kubepods-besteffort-pod88903394_2d14_4910_8460_2f09dba7d264.slice. Oct 31 01:18:59.927573 env[1204]: time="2025-10-31T01:18:59.927534207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6w5z2,Uid:88903394-2d14-4910-8460-2f09dba7d264,Namespace:calico-system,Attempt:0,}" Oct 31 01:18:59.944891 kubelet[1441]: E1031 01:18:59.944854 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:18:59.945802 env[1204]: time="2025-10-31T01:18:59.945764929Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 01:18:59.980280 env[1204]: time="2025-10-31T01:18:59.980203699Z" level=error msg="Failed to destroy network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:59.980617 env[1204]: time="2025-10-31T01:18:59.980575663Z" level=error msg="encountered an error cleaning up failed sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:59.980669 env[1204]: time="2025-10-31T01:18:59.980622574Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6w5z2,Uid:88903394-2d14-4910-8460-2f09dba7d264,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:59.980820 kubelet[1441]: E1031 01:18:59.980789 1441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:18:59.980892 kubelet[1441]: E1031 01:18:59.980836 1441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6w5z2" Oct 31 01:18:59.980892 kubelet[1441]: E1031 01:18:59.980857 1441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6w5z2" Oct 31 01:18:59.980981 kubelet[1441]: E1031 01:18:59.980896 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6w5z2_calico-system(88903394-2d14-4910-8460-2f09dba7d264)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6w5z2_calico-system(88903394-2d14-4910-8460-2f09dba7d264)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:18:59.982696 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161-shm.mount: Deactivated successfully. Oct 31 01:19:00.535074 kubelet[1441]: E1031 01:19:00.535016 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:00.738000 audit[1916]: NETFILTER_CFG table=filter:75 family=2 entries=14 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:00.738000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdd784d800 a2=0 a3=7ffdd784d7ec items=0 ppid=1660 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:00.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:00.750000 audit[1916]: NETFILTER_CFG table=nat:76 family=2 entries=56 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:00.750000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdd784d800 a2=0 a3=7ffdd784d7ec items=0 ppid=1660 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:00.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:00.946369 kubelet[1441]: I1031 01:19:00.946275 1441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:00.946988 env[1204]: time="2025-10-31T01:19:00.946948926Z" level=info msg="StopPodSandbox for \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\"" Oct 31 01:19:00.966335 env[1204]: time="2025-10-31T01:19:00.966275329Z" level=error msg="StopPodSandbox for \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\" failed" error="failed to destroy network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:19:00.966509 kubelet[1441]: E1031 01:19:00.966462 1441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:00.966560 kubelet[1441]: E1031 01:19:00.966512 1441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161"} Oct 31 01:19:00.966600 kubelet[1441]: E1031 01:19:00.966580 1441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88903394-2d14-4910-8460-2f09dba7d264\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:19:00.966674 kubelet[1441]: E1031 01:19:00.966611 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88903394-2d14-4910-8460-2f09dba7d264\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:19:01.535993 kubelet[1441]: E1031 01:19:01.535942 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:02.536276 kubelet[1441]: E1031 01:19:02.536213 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:03.210575 systemd[1]: Created slice kubepods-besteffort-pod7a43691e_702f_4ff3_8020_97a17c342bc7.slice. Oct 31 01:19:03.249575 kubelet[1441]: I1031 01:19:03.249534 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vhqhh\" (UniqueName: \"kubernetes.io/projected/7a43691e-702f-4ff3-8020-97a17c342bc7-kube-api-access-vhqhh\") pod \"nginx-deployment-7fcdb87857-7kvg5\" (UID: \"7a43691e-702f-4ff3-8020-97a17c342bc7\") " pod="default/nginx-deployment-7fcdb87857-7kvg5" Oct 31 01:19:03.513391 env[1204]: time="2025-10-31T01:19:03.513273774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7kvg5,Uid:7a43691e-702f-4ff3-8020-97a17c342bc7,Namespace:default,Attempt:0,}" Oct 31 01:19:03.536837 kubelet[1441]: E1031 01:19:03.536788 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:03.569861 env[1204]: time="2025-10-31T01:19:03.569799356Z" level=error msg="Failed to destroy network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:19:03.570157 env[1204]: time="2025-10-31T01:19:03.570115906Z" level=error msg="encountered an error cleaning up failed sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:19:03.570191 env[1204]: time="2025-10-31T01:19:03.570165771Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7kvg5,Uid:7a43691e-702f-4ff3-8020-97a17c342bc7,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:19:03.570408 kubelet[1441]: E1031 01:19:03.570371 1441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:19:03.570468 kubelet[1441]: E1031 01:19:03.570432 1441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-7kvg5" Oct 31 01:19:03.570468 kubelet[1441]: E1031 01:19:03.570455 1441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-7kvg5" Oct 31 01:19:03.570519 kubelet[1441]: E1031 01:19:03.570498 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-7kvg5_default(7a43691e-702f-4ff3-8020-97a17c342bc7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-7kvg5_default(7a43691e-702f-4ff3-8020-97a17c342bc7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-7kvg5" podUID="7a43691e-702f-4ff3-8020-97a17c342bc7" Oct 31 01:19:03.571430 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020-shm.mount: Deactivated successfully. Oct 31 01:19:03.951609 kubelet[1441]: I1031 01:19:03.951529 1441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:03.952304 env[1204]: time="2025-10-31T01:19:03.952268649Z" level=info msg="StopPodSandbox for \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\"" Oct 31 01:19:03.972992 env[1204]: time="2025-10-31T01:19:03.972937297Z" level=error msg="StopPodSandbox for \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\" failed" error="failed to destroy network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:19:03.973183 kubelet[1441]: E1031 01:19:03.973146 1441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:03.973234 kubelet[1441]: E1031 01:19:03.973198 1441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020"} Oct 31 01:19:03.973271 kubelet[1441]: E1031 01:19:03.973237 1441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7a43691e-702f-4ff3-8020-97a17c342bc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:19:03.973271 kubelet[1441]: E1031 01:19:03.973259 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7a43691e-702f-4ff3-8020-97a17c342bc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-7kvg5" podUID="7a43691e-702f-4ff3-8020-97a17c342bc7" Oct 31 01:19:04.537897 kubelet[1441]: E1031 01:19:04.537848 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:05.538319 kubelet[1441]: E1031 01:19:05.538271 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:05.920588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2488324940.mount: Deactivated successfully. Oct 31 01:19:06.527269 kubelet[1441]: E1031 01:19:06.527221 1441 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:06.538802 kubelet[1441]: E1031 01:19:06.538763 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:06.747339 env[1204]: time="2025-10-31T01:19:06.747268907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:06.749510 env[1204]: time="2025-10-31T01:19:06.749483750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:06.751407 env[1204]: time="2025-10-31T01:19:06.751384484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:06.752729 env[1204]: time="2025-10-31T01:19:06.752698223Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:06.753119 env[1204]: time="2025-10-31T01:19:06.753074259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 01:19:06.759705 env[1204]: time="2025-10-31T01:19:06.758593819Z" level=info msg="CreateContainer within sandbox \"726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 01:19:06.772841 env[1204]: time="2025-10-31T01:19:06.772788757Z" level=info msg="CreateContainer within sandbox \"726062e983d926478c385cf6274973d49c8a5cfe6a43397e8cfb3ce85b631192\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"afc7f914c1ae45fdfb91eef5e50677e4735f3052b5172e6ae4e8cc5528f2cf36\"" Oct 31 01:19:06.773245 env[1204]: time="2025-10-31T01:19:06.773218190Z" level=info msg="StartContainer for \"afc7f914c1ae45fdfb91eef5e50677e4735f3052b5172e6ae4e8cc5528f2cf36\"" Oct 31 01:19:06.787397 systemd[1]: Started cri-containerd-afc7f914c1ae45fdfb91eef5e50677e4735f3052b5172e6ae4e8cc5528f2cf36.scope. Oct 31 01:19:06.803379 kernel: kauditd_printk_skb: 70 callbacks suppressed Oct 31 01:19:06.803487 kernel: audit: type=1400 audit(1761873546.798:524): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd72763f508 items=0 ppid=1526 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:06.816672 kernel: audit: type=1300 audit(1761873546.798:524): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd72763f508 items=0 ppid=1526 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:06.816713 kernel: audit: type=1327 audit(1761873546.798:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633766393134633161653435666466623931656566356535303637 Oct 31 01:19:06.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633766393134633161653435666466623931656566356535303637 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.830305 kernel: audit: type=1400 audit(1761873546.798:525): avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.830378 kernel: audit: type=1400 audit(1761873546.798:525): avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.836051 kernel: audit: type=1400 audit(1761873546.798:525): avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.842112 env[1204]: time="2025-10-31T01:19:06.842062794Z" level=info msg="StartContainer for \"afc7f914c1ae45fdfb91eef5e50677e4735f3052b5172e6ae4e8cc5528f2cf36\" returns successfully" Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.848098 kernel: audit: type=1400 audit(1761873546.798:525): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.853937 kernel: audit: type=1400 audit(1761873546.798:525): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.854088 kernel: audit: type=1400 audit(1761873546.798:525): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.865501 kernel: audit: type=1400 audit(1761873546.798:525): avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.798000 audit: BPF prog-id=75 op=LOAD Oct 31 01:19:06.798000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fdda8 items=0 ppid=1526 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:06.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633766393134633161653435666466623931656566356535303637 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.806000 audit: BPF prog-id=76 op=LOAD Oct 31 01:19:06.806000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fddf8 items=0 ppid=1526 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:06.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633766393134633161653435666466623931656566356535303637 Oct 31 01:19:06.815000 audit: BPF prog-id=76 op=UNLOAD Oct 31 01:19:06.815000 audit: BPF prog-id=75 op=UNLOAD Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:06.815000 audit: BPF prog-id=77 op=LOAD Oct 31 01:19:06.815000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fde88 items=0 ppid=1526 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:06.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166633766393134633161653435666466623931656566356535303637 Oct 31 01:19:06.921995 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 01:19:06.922078 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 01:19:06.956566 kubelet[1441]: E1031 01:19:06.956532 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:06.975409 kubelet[1441]: I1031 01:19:06.970958 1441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pg9st" podStartSLOduration=3.834390322 podStartE2EDuration="19.970942253s" podCreationTimestamp="2025-10-31 01:18:47 +0000 UTC" firstStartedPulling="2025-10-31 01:18:50.617284133 +0000 UTC m=+4.622272640" lastFinishedPulling="2025-10-31 01:19:06.753836055 +0000 UTC m=+20.758824571" observedRunningTime="2025-10-31 01:19:06.970786096 +0000 UTC m=+20.975774622" watchObservedRunningTime="2025-10-31 01:19:06.970942253 +0000 UTC m=+20.975930759" Oct 31 01:19:06.971996 systemd[1]: run-containerd-runc-k8s.io-afc7f914c1ae45fdfb91eef5e50677e4735f3052b5172e6ae4e8cc5528f2cf36-runc.ZkUh9b.mount: Deactivated successfully. Oct 31 01:19:07.539437 kubelet[1441]: E1031 01:19:07.539388 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:07.958475 kubelet[1441]: E1031 01:19:07.958317 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:08.098000 audit[2163]: AVC avc: denied { write } for pid=2163 comm="tee" name="fd" dev="proc" ino=21536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:19:08.098000 audit[2163]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1123e7f2 a2=241 a3=1b6 items=1 ppid=2112 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.098000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 01:19:08.098000 audit: PATH item=0 name="/dev/fd/63" inode=19965 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:08.098000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:19:08.102000 audit[2170]: AVC avc: denied { write } for pid=2170 comm="tee" name="fd" dev="proc" ino=20849 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:19:08.102000 audit[2170]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddfa3b7e1 a2=241 a3=1b6 items=1 ppid=2115 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.102000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 01:19:08.102000 audit: PATH item=0 name="/dev/fd/63" inode=20843 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:08.102000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:19:08.109000 audit[2174]: AVC avc: denied { write } for pid=2174 comm="tee" name="fd" dev="proc" ino=20856 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:19:08.109000 audit[2174]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed96aa7f1 a2=241 a3=1b6 items=1 ppid=2120 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.109000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 01:19:08.109000 audit: PATH item=0 name="/dev/fd/63" inode=20846 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:08.109000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:19:08.111000 audit[2184]: AVC avc: denied { write } for pid=2184 comm="tee" name="fd" dev="proc" ino=20860 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:19:08.111000 audit[2184]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc915c7f0 a2=241 a3=1b6 items=1 ppid=2125 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.111000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 01:19:08.111000 audit[2181]: AVC avc: denied { write } for pid=2181 comm="tee" name="fd" dev="proc" ino=19973 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:19:08.111000 audit: PATH item=0 name="/dev/fd/63" inode=20852 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:08.111000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:19:08.112000 audit[2186]: AVC avc: denied { write } for pid=2186 comm="tee" name="fd" dev="proc" ino=21543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:19:08.112000 audit[2186]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc58a357f0 a2=241 a3=1b6 items=1 ppid=2119 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.112000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 01:19:08.112000 audit: PATH item=0 name="/dev/fd/63" inode=21540 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:08.112000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:19:08.111000 audit[2181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebd4fe7f0 a2=241 a3=1b6 items=1 ppid=2113 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.111000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 01:19:08.111000 audit: PATH item=0 name="/dev/fd/63" inode=19969 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:08.111000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:19:08.113000 audit[2179]: AVC avc: denied { write } for pid=2179 comm="tee" name="fd" dev="proc" ino=19047 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:19:08.113000 audit[2179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc70e737e0 a2=241 a3=1b6 items=1 ppid=2111 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.113000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 01:19:08.113000 audit: PATH item=0 name="/dev/fd/63" inode=19044 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:08.113000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit: BPF prog-id=78 op=LOAD Oct 31 01:19:08.211000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd10724cb0 a2=98 a3=1fffffffffffffff items=0 ppid=2121 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.211000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:19:08.211000 audit: BPF prog-id=78 op=UNLOAD Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit: BPF prog-id=79 op=LOAD Oct 31 01:19:08.211000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd10724b90 a2=94 a3=3 items=0 ppid=2121 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.211000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:19:08.211000 audit: BPF prog-id=79 op=UNLOAD Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit: BPF prog-id=80 op=LOAD Oct 31 01:19:08.211000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd10724bd0 a2=94 a3=7ffd10724db0 items=0 ppid=2121 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.211000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:19:08.211000 audit: BPF prog-id=80 op=UNLOAD Oct 31 01:19:08.211000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.211000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd10724ca0 a2=50 a3=a000000085 items=0 ppid=2121 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.211000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit: BPF prog-id=81 op=LOAD Oct 31 01:19:08.213000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd80b34110 a2=98 a3=3 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.213000 audit: BPF prog-id=81 op=UNLOAD Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit: BPF prog-id=82 op=LOAD Oct 31 01:19:08.213000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd80b33f00 a2=94 a3=54428f items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.213000 audit: BPF prog-id=82 op=UNLOAD Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.213000 audit: BPF prog-id=83 op=LOAD Oct 31 01:19:08.213000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd80b33f30 a2=94 a3=2 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.213000 audit: BPF prog-id=83 op=UNLOAD Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit: BPF prog-id=84 op=LOAD Oct 31 01:19:08.312000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd80b33df0 a2=94 a3=1 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.312000 audit: BPF prog-id=84 op=UNLOAD Oct 31 01:19:08.312000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.312000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd80b33ec0 a2=50 a3=7ffd80b33fa0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b33e00 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b33e30 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b33d40 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b33e50 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b33e30 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b33e20 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b33e50 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b33e30 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b33e50 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd80b33e20 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd80b33e90 a2=28 a3=0 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd80b33c40 a2=50 a3=1 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit: BPF prog-id=85 op=LOAD Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd80b33c40 a2=94 a3=5 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit: BPF prog-id=85 op=UNLOAD Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd80b33cf0 a2=50 a3=1 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd80b33e10 a2=4 a3=38 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { confidentiality } for pid=2232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd80b33e60 a2=94 a3=6 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.320000 audit[2232]: AVC avc: denied { confidentiality } for pid=2232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:08.320000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd80b33610 a2=94 a3=88 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.321000 audit[2232]: AVC avc: denied { confidentiality } for pid=2232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:08.321000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd80b33610 a2=94 a3=88 items=0 ppid=2121 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit: BPF prog-id=86 op=LOAD Oct 31 01:19:08.327000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff86eddc10 a2=98 a3=1999999999999999 items=0 ppid=2121 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.327000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:19:08.327000 audit: BPF prog-id=86 op=UNLOAD Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit: BPF prog-id=87 op=LOAD Oct 31 01:19:08.327000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff86eddaf0 a2=94 a3=ffff items=0 ppid=2121 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.327000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:19:08.327000 audit: BPF prog-id=87 op=UNLOAD Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.327000 audit: BPF prog-id=88 op=LOAD Oct 31 01:19:08.327000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff86eddb30 a2=94 a3=7fff86eddd10 items=0 ppid=2121 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.327000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:19:08.327000 audit: BPF prog-id=88 op=UNLOAD Oct 31 01:19:08.372593 systemd-networkd[1032]: vxlan.calico: Link UP Oct 31 01:19:08.372606 systemd-networkd[1032]: vxlan.calico: Gained carrier Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit: BPF prog-id=89 op=LOAD Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea8b7b130 a2=98 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit: BPF prog-id=89 op=UNLOAD Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit: BPF prog-id=90 op=LOAD Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea8b7af40 a2=94 a3=54428f items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit: BPF prog-id=90 op=UNLOAD Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit: BPF prog-id=91 op=LOAD Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea8b7af70 a2=94 a3=2 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit: BPF prog-id=91 op=UNLOAD Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea8b7ae40 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea8b7ae70 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea8b7ad80 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea8b7ae90 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea8b7ae70 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea8b7ae60 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea8b7ae90 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea8b7ae70 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea8b7ae90 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea8b7ae60 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea8b7aed0 a2=28 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.390000 audit: BPF prog-id=92 op=LOAD Oct 31 01:19:08.390000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea8b7ad40 a2=94 a3=0 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.390000 audit: BPF prog-id=92 op=UNLOAD Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffea8b7ad30 a2=50 a3=2800 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffea8b7ad30 a2=50 a3=2800 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit: BPF prog-id=93 op=LOAD Oct 31 01:19:08.391000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea8b7a550 a2=94 a3=2 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.391000 audit: BPF prog-id=93 op=UNLOAD Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.391000 audit: BPF prog-id=94 op=LOAD Oct 31 01:19:08.391000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea8b7a650 a2=94 a3=30 items=0 ppid=2121 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit: BPF prog-id=95 op=LOAD Oct 31 01:19:08.394000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6792e510 a2=98 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.394000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.394000 audit: BPF prog-id=95 op=UNLOAD Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit: BPF prog-id=96 op=LOAD Oct 31 01:19:08.394000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6792e300 a2=94 a3=54428f items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.394000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.394000 audit: BPF prog-id=96 op=UNLOAD Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.394000 audit: BPF prog-id=97 op=LOAD Oct 31 01:19:08.394000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6792e330 a2=94 a3=2 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.394000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.395000 audit: BPF prog-id=97 op=UNLOAD Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit: BPF prog-id=98 op=LOAD Oct 31 01:19:08.497000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6792e1f0 a2=94 a3=1 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.497000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.497000 audit: BPF prog-id=98 op=UNLOAD Oct 31 01:19:08.497000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.497000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6792e2c0 a2=50 a3=7ffd6792e3a0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.497000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6792e200 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6792e230 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6792e140 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6792e250 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6792e230 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6792e220 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6792e250 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6792e230 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6792e250 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6792e220 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.505000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.505000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6792e290 a2=28 a3=0 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.505000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6792e040 a2=50 a3=1 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.506000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit: BPF prog-id=99 op=LOAD Oct 31 01:19:08.506000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6792e040 a2=94 a3=5 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.506000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.506000 audit: BPF prog-id=99 op=UNLOAD Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6792e0f0 a2=50 a3=1 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.506000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd6792e210 a2=4 a3=38 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.506000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { confidentiality } for pid=2266 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:08.506000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6792e260 a2=94 a3=6 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.506000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { confidentiality } for pid=2266 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:08.506000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6792da10 a2=94 a3=88 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.506000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.506000 audit[2266]: AVC avc: denied { confidentiality } for pid=2266 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:08.506000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6792da10 a2=94 a3=88 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.506000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.507000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.507000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6792f440 a2=10 a3=208 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.507000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.507000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.507000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6792f2e0 a2=10 a3=3 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.507000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.507000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.507000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6792f280 a2=10 a3=3 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.507000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.507000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:08.507000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6792f280 a2=10 a3=7 items=0 ppid=2121 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.507000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:19:08.513000 audit: BPF prog-id=94 op=UNLOAD Oct 31 01:19:08.539664 kubelet[1441]: E1031 01:19:08.539624 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:08.547000 audit[2292]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:08.547000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe262a88d0 a2=0 a3=7ffe262a88bc items=0 ppid=2121 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:08.552000 audit[2293]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:08.552000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff74140100 a2=0 a3=7fff741400ec items=0 ppid=2121 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.552000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:08.554000 audit[2297]: NETFILTER_CFG table=filter:79 family=2 entries=39 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:08.554000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe2acb4040 a2=0 a3=7ffe2acb402c items=0 ppid=2121 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.554000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:08.555000 audit[2294]: NETFILTER_CFG table=raw:80 family=2 entries=21 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:08.555000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe0d5b6830 a2=0 a3=7ffe0d5b681c items=0 ppid=2121 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:08.555000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:09.540325 kubelet[1441]: E1031 01:19:09.540274 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:10.413568 systemd-networkd[1032]: vxlan.calico: Gained IPv6LL Oct 31 01:19:10.541118 kubelet[1441]: E1031 01:19:10.541082 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:11.541866 kubelet[1441]: E1031 01:19:11.541825 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:12.542334 kubelet[1441]: E1031 01:19:12.542293 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:13.543497 kubelet[1441]: E1031 01:19:13.543437 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:14.544034 kubelet[1441]: E1031 01:19:14.543988 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:15.544976 kubelet[1441]: E1031 01:19:15.544918 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:15.922363 env[1204]: time="2025-10-31T01:19:15.922238529Z" level=info msg="StopPodSandbox for \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\"" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.957 [INFO][2324] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.957 [INFO][2324] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" iface="eth0" netns="/var/run/netns/cni-a042dafd-131e-5774-2ae3-c245ea8a0950" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.957 [INFO][2324] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" iface="eth0" netns="/var/run/netns/cni-a042dafd-131e-5774-2ae3-c245ea8a0950" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.957 [INFO][2324] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" iface="eth0" netns="/var/run/netns/cni-a042dafd-131e-5774-2ae3-c245ea8a0950" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.957 [INFO][2324] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.957 [INFO][2324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.974 [INFO][2332] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.974 [INFO][2332] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.974 [INFO][2332] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.980 [WARNING][2332] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.980 [INFO][2332] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.981 [INFO][2332] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:15.987870 env[1204]: 2025-10-31 01:19:15.984 [INFO][2324] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:15.988518 env[1204]: time="2025-10-31T01:19:15.988461810Z" level=info msg="TearDown network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\" successfully" Oct 31 01:19:15.988735 env[1204]: time="2025-10-31T01:19:15.988683084Z" level=info msg="StopPodSandbox for \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\" returns successfully" Oct 31 01:19:15.989824 systemd[1]: run-netns-cni\x2da042dafd\x2d131e\x2d5774\x2d2ae3\x2dc245ea8a0950.mount: Deactivated successfully. Oct 31 01:19:15.990090 env[1204]: time="2025-10-31T01:19:15.989825757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6w5z2,Uid:88903394-2d14-4910-8460-2f09dba7d264,Namespace:calico-system,Attempt:1,}" Oct 31 01:19:16.545155 kubelet[1441]: E1031 01:19:16.545112 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:16.581805 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:19:16.581957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia8e21e0c121: link becomes ready Oct 31 01:19:16.577967 systemd-networkd[1032]: calia8e21e0c121: Link UP Oct 31 01:19:16.582318 systemd-networkd[1032]: calia8e21e0c121: Gained carrier Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.529 [INFO][2341] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-csi--node--driver--6w5z2-eth0 csi-node-driver- calico-system 88903394-2d14-4910-8460-2f09dba7d264 1242 0 2025-10-31 01:18:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.143 csi-node-driver-6w5z2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia8e21e0c121 [] [] }} ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.529 [INFO][2341] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.550 [INFO][2355] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" HandleID="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.551 [INFO][2355] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" HandleID="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c8140), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.143", "pod":"csi-node-driver-6w5z2", "timestamp":"2025-10-31 01:19:16.550984105 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.551 [INFO][2355] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.551 [INFO][2355] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.551 [INFO][2355] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.556 [INFO][2355] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.560 [INFO][2355] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.563 [INFO][2355] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.564 [INFO][2355] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.566 [INFO][2355] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.566 [INFO][2355] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.567 [INFO][2355] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8 Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.570 [INFO][2355] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.574 [INFO][2355] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.66.1/26] block=192.168.66.0/26 handle="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.574 [INFO][2355] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.1/26] handle="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" host="10.0.0.143" Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.574 [INFO][2355] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:16.591003 env[1204]: 2025-10-31 01:19:16.574 [INFO][2355] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.66.1/26] IPv6=[] ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" HandleID="k8s-pod-network.4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:16.591633 env[1204]: 2025-10-31 01:19:16.576 [INFO][2341] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6w5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88903394-2d14-4910-8460-2f09dba7d264", ResourceVersion:"1242", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"csi-node-driver-6w5z2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia8e21e0c121", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:16.591633 env[1204]: 2025-10-31 01:19:16.576 [INFO][2341] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.1/32] ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:16.591633 env[1204]: 2025-10-31 01:19:16.576 [INFO][2341] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia8e21e0c121 ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:16.591633 env[1204]: 2025-10-31 01:19:16.581 [INFO][2341] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:16.591633 env[1204]: 2025-10-31 01:19:16.582 [INFO][2341] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6w5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88903394-2d14-4910-8460-2f09dba7d264", ResourceVersion:"1242", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8", Pod:"csi-node-driver-6w5z2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia8e21e0c121", MAC:"de:79:94:1e:0d:0f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:16.591633 env[1204]: 2025-10-31 01:19:16.588 [INFO][2341] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8" Namespace="calico-system" Pod="csi-node-driver-6w5z2" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:16.603759 env[1204]: time="2025-10-31T01:19:16.603688657Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:19:16.603759 env[1204]: time="2025-10-31T01:19:16.603738508Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:19:16.603873 env[1204]: time="2025-10-31T01:19:16.603748997Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:19:16.603999 env[1204]: time="2025-10-31T01:19:16.603952770Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8 pid=2382 runtime=io.containerd.runc.v2 Oct 31 01:19:16.616309 systemd[1]: Started cri-containerd-4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8.scope. Oct 31 01:19:16.600000 audit[2373]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:16.621046 kernel: kauditd_printk_skb: 590 callbacks suppressed Oct 31 01:19:16.621100 kernel: audit: type=1325 audit(1761873556.600:639): table=filter:81 family=2 entries=38 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:16.600000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffd65178350 a2=0 a3=7ffd6517833c items=0 ppid=2121 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:16.633095 kernel: audit: type=1300 audit(1761873556.600:639): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffd65178350 a2=0 a3=7ffd6517833c items=0 ppid=2121 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:16.633140 kernel: audit: type=1327 audit(1761873556.600:639): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:16.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:16.642770 kernel: audit: type=1400 audit(1761873556.627:640): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.647953 kernel: audit: type=1400 audit(1761873556.627:641): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.653034 kernel: audit: type=1400 audit(1761873556.627:642): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.653222 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:19:16.658257 kernel: audit: type=1400 audit(1761873556.627:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.658321 kernel: audit: type=1400 audit(1761873556.627:644): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.668434 kernel: audit: type=1400 audit(1761873556.627:645): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.668475 kernel: audit: type=1400 audit(1761873556.627:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.631000 audit: BPF prog-id=100 op=LOAD Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:16.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376531386438393631373236343838303861326162393930656361 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:16.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376531386438393631373236343838303861326162393930656361 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.632000 audit: BPF prog-id=101 op=LOAD Oct 31 01:19:16.632000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e5ce0 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:16.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376531386438393631373236343838303861326162393930656361 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.636000 audit: BPF prog-id=102 op=LOAD Oct 31 01:19:16.636000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e5d28 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:16.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376531386438393631373236343838303861326162393930656361 Oct 31 01:19:16.641000 audit: BPF prog-id=102 op=UNLOAD Oct 31 01:19:16.641000 audit: BPF prog-id=101 op=UNLOAD Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:16.641000 audit: BPF prog-id=103 op=LOAD Oct 31 01:19:16.641000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000356138 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:16.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466376531386438393631373236343838303861326162393930656361 Oct 31 01:19:16.677493 env[1204]: time="2025-10-31T01:19:16.677456139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6w5z2,Uid:88903394-2d14-4910-8460-2f09dba7d264,Namespace:calico-system,Attempt:1,} returns sandbox id \"4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8\"" Oct 31 01:19:16.679664 env[1204]: time="2025-10-31T01:19:16.679632114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:19:16.923387 env[1204]: time="2025-10-31T01:19:16.921640683Z" level=info msg="StopPodSandbox for \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\"" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.954 [INFO][2432] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.954 [INFO][2432] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" iface="eth0" netns="/var/run/netns/cni-8428c69b-be16-860a-9fea-3883c052dcdc" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.954 [INFO][2432] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" iface="eth0" netns="/var/run/netns/cni-8428c69b-be16-860a-9fea-3883c052dcdc" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.954 [INFO][2432] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" iface="eth0" netns="/var/run/netns/cni-8428c69b-be16-860a-9fea-3883c052dcdc" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.955 [INFO][2432] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.955 [INFO][2432] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.971 [INFO][2441] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.971 [INFO][2441] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.971 [INFO][2441] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.976 [WARNING][2441] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.976 [INFO][2441] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.978 [INFO][2441] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:16.981059 env[1204]: 2025-10-31 01:19:16.979 [INFO][2432] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:16.981466 env[1204]: time="2025-10-31T01:19:16.981226793Z" level=info msg="TearDown network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\" successfully" Oct 31 01:19:16.981466 env[1204]: time="2025-10-31T01:19:16.981255474Z" level=info msg="StopPodSandbox for \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\" returns successfully" Oct 31 01:19:16.981793 env[1204]: time="2025-10-31T01:19:16.981750896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7kvg5,Uid:7a43691e-702f-4ff3-8020-97a17c342bc7,Namespace:default,Attempt:1,}" Oct 31 01:19:16.989630 systemd[1]: run-containerd-runc-k8s.io-4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8-runc.8rjort.mount: Deactivated successfully. Oct 31 01:19:16.989729 systemd[1]: run-netns-cni\x2d8428c69b\x2dbe16\x2d860a\x2d9fea\x2d3883c052dcdc.mount: Deactivated successfully. Oct 31 01:19:17.031521 env[1204]: time="2025-10-31T01:19:17.031476852Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:17.033100 env[1204]: time="2025-10-31T01:19:17.033029386Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:19:17.033298 kubelet[1441]: E1031 01:19:17.033252 1441 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:17.033389 kubelet[1441]: E1031 01:19:17.033307 1441 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:17.034421 kubelet[1441]: E1031 01:19:17.034360 1441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-snz7k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-6w5z2_calico-system(88903394-2d14-4910-8460-2f09dba7d264): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:17.036694 env[1204]: time="2025-10-31T01:19:17.036652734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:19:17.071322 systemd-networkd[1032]: cali9c3745d66ee: Link UP Oct 31 01:19:17.073843 systemd-networkd[1032]: cali9c3745d66ee: Gained carrier Oct 31 01:19:17.074420 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9c3745d66ee: link becomes ready Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.019 [INFO][2449] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0 nginx-deployment-7fcdb87857- default 7a43691e-702f-4ff3-8020-97a17c342bc7 1250 0 2025-10-31 01:19:03 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 nginx-deployment-7fcdb87857-7kvg5 eth0 default [] [] [kns.default ksa.default.default] cali9c3745d66ee [] [] }} ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.019 [INFO][2449] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.040 [INFO][2464] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" HandleID="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.040 [INFO][2464] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" HandleID="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c91a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nginx-deployment-7fcdb87857-7kvg5", "timestamp":"2025-10-31 01:19:17.040035127 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.040 [INFO][2464] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.040 [INFO][2464] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.040 [INFO][2464] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.045 [INFO][2464] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.049 [INFO][2464] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.052 [INFO][2464] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.054 [INFO][2464] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.055 [INFO][2464] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.055 [INFO][2464] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.057 [INFO][2464] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.060 [INFO][2464] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.065 [INFO][2464] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.66.2/26] block=192.168.66.0/26 handle="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.065 [INFO][2464] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.2/26] handle="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" host="10.0.0.143" Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.065 [INFO][2464] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:17.081865 env[1204]: 2025-10-31 01:19:17.065 [INFO][2464] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.66.2/26] IPv6=[] ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" HandleID="k8s-pod-network.2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:17.082344 env[1204]: 2025-10-31 01:19:17.069 [INFO][2449] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7a43691e-702f-4ff3-8020-97a17c342bc7", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-7kvg5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c3745d66ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:17.082344 env[1204]: 2025-10-31 01:19:17.069 [INFO][2449] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.2/32] ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:17.082344 env[1204]: 2025-10-31 01:19:17.069 [INFO][2449] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9c3745d66ee ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:17.082344 env[1204]: 2025-10-31 01:19:17.073 [INFO][2449] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:17.082344 env[1204]: 2025-10-31 01:19:17.074 [INFO][2449] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7a43691e-702f-4ff3-8020-97a17c342bc7", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f", Pod:"nginx-deployment-7fcdb87857-7kvg5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c3745d66ee", MAC:"2a:a6:2f:d9:40:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:17.082344 env[1204]: 2025-10-31 01:19:17.080 [INFO][2449] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f" Namespace="default" Pod="nginx-deployment-7fcdb87857-7kvg5" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:17.089000 audit[2484]: NETFILTER_CFG table=filter:82 family=2 entries=42 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:17.089000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffed770c7a0 a2=0 a3=7ffed770c78c items=0 ppid=2121 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:17.089000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:17.091146 env[1204]: time="2025-10-31T01:19:17.091078245Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:19:17.091146 env[1204]: time="2025-10-31T01:19:17.091121253Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:19:17.091146 env[1204]: time="2025-10-31T01:19:17.091131742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:19:17.091416 env[1204]: time="2025-10-31T01:19:17.091343306Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f pid=2487 runtime=io.containerd.runc.v2 Oct 31 01:19:17.103409 systemd[1]: Started cri-containerd-2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f.scope. Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.113000 audit: BPF prog-id=104 op=LOAD Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2487 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:17.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336665376131666561316433663237303536393934326664613539 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2487 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:17.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336665376131666561316433663237303536393934326664613539 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit: BPF prog-id=105 op=LOAD Oct 31 01:19:17.114000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000393020 items=0 ppid=2487 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:17.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336665376131666561316433663237303536393934326664613539 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit: BPF prog-id=106 op=LOAD Oct 31 01:19:17.114000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000393068 items=0 ppid=2487 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:17.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336665376131666561316433663237303536393934326664613539 Oct 31 01:19:17.114000 audit: BPF prog-id=106 op=UNLOAD Oct 31 01:19:17.114000 audit: BPF prog-id=105 op=UNLOAD Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:17.114000 audit: BPF prog-id=107 op=LOAD Oct 31 01:19:17.114000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000393478 items=0 ppid=2487 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:17.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265336665376131666561316433663237303536393934326664613539 Oct 31 01:19:17.115422 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:19:17.135362 env[1204]: time="2025-10-31T01:19:17.135314419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7kvg5,Uid:7a43691e-702f-4ff3-8020-97a17c342bc7,Namespace:default,Attempt:1,} returns sandbox id \"2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f\"" Oct 31 01:19:17.376960 env[1204]: time="2025-10-31T01:19:17.376857329Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:17.378032 env[1204]: time="2025-10-31T01:19:17.377975674Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:19:17.378213 kubelet[1441]: E1031 01:19:17.378173 1441 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:17.378284 kubelet[1441]: E1031 01:19:17.378225 1441 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:17.378467 kubelet[1441]: E1031 01:19:17.378425 1441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-snz7k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-6w5z2_calico-system(88903394-2d14-4910-8460-2f09dba7d264): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:17.378889 env[1204]: time="2025-10-31T01:19:17.378851531Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:19:17.379604 kubelet[1441]: E1031 01:19:17.379551 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:19:17.545846 kubelet[1441]: E1031 01:19:17.545811 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:17.975258 kubelet[1441]: E1031 01:19:17.975218 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:19:17.989730 systemd[1]: run-containerd-runc-k8s.io-2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f-runc.JTfkea.mount: Deactivated successfully. Oct 31 01:19:18.546459 kubelet[1441]: E1031 01:19:18.546423 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:18.606580 systemd-networkd[1032]: calia8e21e0c121: Gained IPv6LL Oct 31 01:19:18.797599 systemd-networkd[1032]: cali9c3745d66ee: Gained IPv6LL Oct 31 01:19:19.546879 kubelet[1441]: E1031 01:19:19.546822 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:19.927580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4134083770.mount: Deactivated successfully. Oct 31 01:19:20.546967 kubelet[1441]: E1031 01:19:20.546931 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:21.547050 kubelet[1441]: E1031 01:19:21.547002 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:22.169248 env[1204]: time="2025-10-31T01:19:22.169201107Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:22.171188 env[1204]: time="2025-10-31T01:19:22.171149335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:22.172792 env[1204]: time="2025-10-31T01:19:22.172758257Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:22.174406 env[1204]: time="2025-10-31T01:19:22.174364583Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:22.175060 env[1204]: time="2025-10-31T01:19:22.175015091Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:19:22.177036 env[1204]: time="2025-10-31T01:19:22.177008293Z" level=info msg="CreateContainer within sandbox \"2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 31 01:19:22.189278 env[1204]: time="2025-10-31T01:19:22.189237243Z" level=info msg="CreateContainer within sandbox \"2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c664544540718521f437553984fa504343df2dc1d50b11799e7c8d3e5c03f9c7\"" Oct 31 01:19:22.189702 env[1204]: time="2025-10-31T01:19:22.189678027Z" level=info msg="StartContainer for \"c664544540718521f437553984fa504343df2dc1d50b11799e7c8d3e5c03f9c7\"" Oct 31 01:19:22.205494 systemd[1]: Started cri-containerd-c664544540718521f437553984fa504343df2dc1d50b11799e7c8d3e5c03f9c7.scope. Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.215212 kernel: kauditd_printk_skb: 110 callbacks suppressed Oct 31 01:19:22.215267 kernel: audit: type=1400 audit(1761873562.213:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.225110 kernel: audit: type=1400 audit(1761873562.213:678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.225159 kernel: audit: type=1400 audit(1761873562.213:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.235041 kernel: audit: type=1400 audit(1761873562.213:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.235082 kernel: audit: type=1400 audit(1761873562.213:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.245112 kernel: audit: type=1400 audit(1761873562.213:682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.245168 kernel: audit: type=1400 audit(1761873562.213:683): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.255196 kernel: audit: type=1400 audit(1761873562.213:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.255300 kernel: audit: type=1400 audit(1761873562.213:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.264996 kernel: audit: type=1400 audit(1761873562.219:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.219000 audit: BPF prog-id=108 op=LOAD Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2487 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:22.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363435343435343037313835323166343337353533393834666135 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2487 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:22.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363435343435343037313835323166343337353533393834666135 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.220000 audit: BPF prog-id=109 op=LOAD Oct 31 01:19:22.220000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002111f0 items=0 ppid=2487 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:22.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363435343435343037313835323166343337353533393834666135 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.224000 audit: BPF prog-id=110 op=LOAD Oct 31 01:19:22.224000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000211238 items=0 ppid=2487 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:22.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363435343435343037313835323166343337353533393834666135 Oct 31 01:19:22.229000 audit: BPF prog-id=110 op=UNLOAD Oct 31 01:19:22.229000 audit: BPF prog-id=109 op=UNLOAD Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:22.229000 audit: BPF prog-id=111 op=LOAD Oct 31 01:19:22.229000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000211648 items=0 ppid=2487 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:22.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363435343435343037313835323166343337353533393834666135 Oct 31 01:19:22.269784 env[1204]: time="2025-10-31T01:19:22.269738614Z" level=info msg="StartContainer for \"c664544540718521f437553984fa504343df2dc1d50b11799e7c8d3e5c03f9c7\" returns successfully" Oct 31 01:19:22.547969 kubelet[1441]: E1031 01:19:22.547907 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:23.548903 kubelet[1441]: E1031 01:19:23.548845 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:24.549767 kubelet[1441]: E1031 01:19:24.549708 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:24.903000 audit[2595]: NETFILTER_CFG table=filter:83 family=2 entries=26 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.903000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffdbcff7660 a2=0 a3=7ffdbcff764c items=0 ppid=1660 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.908000 audit[2595]: NETFILTER_CFG table=nat:84 family=2 entries=20 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.908000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdbcff7660 a2=0 a3=0 items=0 ppid=1660 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.922000 audit[2597]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.922000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe461d1920 a2=0 a3=7ffe461d190c items=0 ppid=1660 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.927000 audit[2597]: NETFILTER_CFG table=nat:86 family=2 entries=20 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:24.927000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe461d1920 a2=0 a3=0 items=0 ppid=1660 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:24.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:24.933751 kubelet[1441]: I1031 01:19:24.933701 1441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-7kvg5" podStartSLOduration=16.8938099 podStartE2EDuration="21.933686464s" podCreationTimestamp="2025-10-31 01:19:03 +0000 UTC" firstStartedPulling="2025-10-31 01:19:17.136063044 +0000 UTC m=+31.141051561" lastFinishedPulling="2025-10-31 01:19:22.175939619 +0000 UTC m=+36.180928125" observedRunningTime="2025-10-31 01:19:22.988600673 +0000 UTC m=+36.993589189" watchObservedRunningTime="2025-10-31 01:19:24.933686464 +0000 UTC m=+38.938674980" Oct 31 01:19:24.938162 systemd[1]: Created slice kubepods-besteffort-podb8e2a788_5998_42d0_ae8d_a1c8d81309b7.slice. Oct 31 01:19:24.963084 kubelet[1441]: I1031 01:19:24.963040 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/b8e2a788-5998-42d0-ae8d-a1c8d81309b7-data\") pod \"nfs-server-provisioner-0\" (UID: \"b8e2a788-5998-42d0-ae8d-a1c8d81309b7\") " pod="default/nfs-server-provisioner-0" Oct 31 01:19:24.963084 kubelet[1441]: I1031 01:19:24.963082 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mv42h\" (UniqueName: \"kubernetes.io/projected/b8e2a788-5998-42d0-ae8d-a1c8d81309b7-kube-api-access-mv42h\") pod \"nfs-server-provisioner-0\" (UID: \"b8e2a788-5998-42d0-ae8d-a1c8d81309b7\") " pod="default/nfs-server-provisioner-0" Oct 31 01:19:25.240882 env[1204]: time="2025-10-31T01:19:25.240842469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b8e2a788-5998-42d0-ae8d-a1c8d81309b7,Namespace:default,Attempt:0,}" Oct 31 01:19:25.336584 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:19:25.337214 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 31 01:19:25.336714 systemd-networkd[1032]: cali60e51b789ff: Link UP Oct 31 01:19:25.336922 systemd-networkd[1032]: cali60e51b789ff: Gained carrier Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.285 [INFO][2599] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default b8e2a788-5998-42d0-ae8d-a1c8d81309b7 1327 0 2025-10-31 01:19:24 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.143 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.286 [INFO][2599] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.306 [INFO][2615] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" HandleID="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.306 [INFO][2615] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" HandleID="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c97e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-31 01:19:25.306028311 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.306 [INFO][2615] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.306 [INFO][2615] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.306 [INFO][2615] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.311 [INFO][2615] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.315 [INFO][2615] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.318 [INFO][2615] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.319 [INFO][2615] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.321 [INFO][2615] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.321 [INFO][2615] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.322 [INFO][2615] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.325 [INFO][2615] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.329 [INFO][2615] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.66.3/26] block=192.168.66.0/26 handle="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.329 [INFO][2615] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.3/26] handle="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" host="10.0.0.143" Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.329 [INFO][2615] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:25.346112 env[1204]: 2025-10-31 01:19:25.329 [INFO][2615] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.66.3/26] IPv6=[] ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" HandleID="k8s-pod-network.1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:19:25.347075 env[1204]: 2025-10-31 01:19:25.330 [INFO][2599] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b8e2a788-5998-42d0-ae8d-a1c8d81309b7", ResourceVersion:"1327", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:25.347075 env[1204]: 2025-10-31 01:19:25.330 [INFO][2599] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.3/32] ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:19:25.347075 env[1204]: 2025-10-31 01:19:25.330 [INFO][2599] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:19:25.347075 env[1204]: 2025-10-31 01:19:25.336 [INFO][2599] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:19:25.347266 env[1204]: 2025-10-31 01:19:25.337 [INFO][2599] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b8e2a788-5998-42d0-ae8d-a1c8d81309b7", ResourceVersion:"1327", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"62:2a:ea:ea:00:e5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:25.347266 env[1204]: 2025-10-31 01:19:25.344 [INFO][2599] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:19:25.354299 env[1204]: time="2025-10-31T01:19:25.354237965Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:19:25.354517 env[1204]: time="2025-10-31T01:19:25.354272700Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:19:25.354517 env[1204]: time="2025-10-31T01:19:25.354281672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:19:25.354517 env[1204]: time="2025-10-31T01:19:25.354444261Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd pid=2639 runtime=io.containerd.runc.v2 Oct 31 01:19:25.354000 audit[2641]: NETFILTER_CFG table=filter:87 family=2 entries=40 op=nft_register_chain pid=2641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:25.354000 audit[2641]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffda4ccf020 a2=0 a3=7ffda4ccf00c items=0 ppid=2121 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:25.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:25.368526 systemd[1]: Started cri-containerd-1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd.scope. Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit: BPF prog-id=112 op=LOAD Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:25.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333935303362313838396631393437666131396634386537373731 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:25.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333935303362313838396631393437666131396634386537373731 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit: BPF prog-id=113 op=LOAD Oct 31 01:19:25.378000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000218a20 items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:25.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333935303362313838396631393437666131396634386537373731 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit: BPF prog-id=114 op=LOAD Oct 31 01:19:25.378000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000218a68 items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:25.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333935303362313838396631393437666131396634386537373731 Oct 31 01:19:25.378000 audit: BPF prog-id=114 op=UNLOAD Oct 31 01:19:25.378000 audit: BPF prog-id=113 op=UNLOAD Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:25.378000 audit: BPF prog-id=115 op=LOAD Oct 31 01:19:25.378000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000218e78 items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:25.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333935303362313838396631393437666131396634386537373731 Oct 31 01:19:25.379303 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:19:25.399819 env[1204]: time="2025-10-31T01:19:25.399760067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b8e2a788-5998-42d0-ae8d-a1c8d81309b7,Namespace:default,Attempt:0,} returns sandbox id \"1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd\"" Oct 31 01:19:25.401523 env[1204]: time="2025-10-31T01:19:25.401449080Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 31 01:19:25.550502 kubelet[1441]: E1031 01:19:25.550404 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:25.986371 update_engine[1199]: I1031 01:19:25.986310 1199 update_attempter.cc:509] Updating boot flags... Oct 31 01:19:26.072028 systemd[1]: run-containerd-runc-k8s.io-1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd-runc.pqsDbB.mount: Deactivated successfully. Oct 31 01:19:26.526831 kubelet[1441]: E1031 01:19:26.526796 1441 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:26.551177 kubelet[1441]: E1031 01:19:26.551138 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:26.733813 systemd-networkd[1032]: cali60e51b789ff: Gained IPv6LL Oct 31 01:19:27.552019 kubelet[1441]: E1031 01:19:27.551961 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:27.657888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount248542102.mount: Deactivated successfully. Oct 31 01:19:28.552413 kubelet[1441]: E1031 01:19:28.552343 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:29.552922 kubelet[1441]: E1031 01:19:29.552861 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:29.993388 env[1204]: time="2025-10-31T01:19:29.993318058Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:29.995740 env[1204]: time="2025-10-31T01:19:29.995699553Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:29.997474 env[1204]: time="2025-10-31T01:19:29.997443570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:29.999165 env[1204]: time="2025-10-31T01:19:29.999124901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:29.999799 env[1204]: time="2025-10-31T01:19:29.999768794Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Oct 31 01:19:30.001850 env[1204]: time="2025-10-31T01:19:30.001820604Z" level=info msg="CreateContainer within sandbox \"1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 31 01:19:30.013440 env[1204]: time="2025-10-31T01:19:30.013400085Z" level=info msg="CreateContainer within sandbox \"1139503b1889f1947fa19f48e777114ae4cbbe4e2a2c90cd38a81c8cdaf663bd\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"80e13eb23c0e99b768978f0c99f7ac112a37cdc9054b3cf6d43388145e18194a\"" Oct 31 01:19:30.013905 env[1204]: time="2025-10-31T01:19:30.013871602Z" level=info msg="StartContainer for \"80e13eb23c0e99b768978f0c99f7ac112a37cdc9054b3cf6d43388145e18194a\"" Oct 31 01:19:30.029695 systemd[1]: run-containerd-runc-k8s.io-80e13eb23c0e99b768978f0c99f7ac112a37cdc9054b3cf6d43388145e18194a-runc.FgyKTs.mount: Deactivated successfully. Oct 31 01:19:30.030927 systemd[1]: Started cri-containerd-80e13eb23c0e99b768978f0c99f7ac112a37cdc9054b3cf6d43388145e18194a.scope. Oct 31 01:19:30.047379 kernel: kauditd_printk_skb: 119 callbacks suppressed Oct 31 01:19:30.047492 kernel: audit: type=1400 audit(1761873570.042:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.055334 kernel: audit: type=1400 audit(1761873570.042:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.055398 kernel: audit: type=1400 audit(1761873570.042:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.064976 kernel: audit: type=1400 audit(1761873570.042:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.065019 kernel: audit: type=1400 audit(1761873570.042:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.074698 kernel: audit: type=1400 audit(1761873570.042:723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.074768 kernel: audit: type=1400 audit(1761873570.042:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.084428 kernel: audit: type=1400 audit(1761873570.042:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.084498 kernel: audit: type=1400 audit(1761873570.042:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.089250 kernel: audit: type=1400 audit(1761873570.044:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.094068 env[1204]: time="2025-10-31T01:19:30.094028988Z" level=info msg="StartContainer for \"80e13eb23c0e99b768978f0c99f7ac112a37cdc9054b3cf6d43388145e18194a\" returns successfully" Oct 31 01:19:30.044000 audit: BPF prog-id=116 op=LOAD Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2639 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:30.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653133656232336330653939623736383937386630633939663761 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2639 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:30.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653133656232336330653939623736383937386630633939663761 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.044000 audit: BPF prog-id=117 op=LOAD Oct 31 01:19:30.044000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020afb0 items=0 ppid=2639 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:30.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653133656232336330653939623736383937386630633939663761 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.049000 audit: BPF prog-id=118 op=LOAD Oct 31 01:19:30.049000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020aff8 items=0 ppid=2639 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:30.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653133656232336330653939623736383937386630633939663761 Oct 31 01:19:30.053000 audit: BPF prog-id=118 op=UNLOAD Oct 31 01:19:30.053000 audit: BPF prog-id=117 op=UNLOAD Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:30.053000 audit: BPF prog-id=119 op=LOAD Oct 31 01:19:30.053000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020b408 items=0 ppid=2639 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:30.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653133656232336330653939623736383937386630633939663761 Oct 31 01:19:30.133000 audit[2730]: AVC avc: denied { search } for pid=2730 comm="rpcbind" name="crypto" dev="proc" ino=23638 scontext=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:19:30.133000 audit[2730]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f25378e20c0 a2=0 a3=0 items=0 ppid=2711 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 key=(null) Oct 31 01:19:30.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 31 01:19:30.163000 audit[2735]: AVC avc: denied { search } for pid=2735 comm="dbus-daemon" name="crypto" dev="proc" ino=23638 scontext=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:19:30.163000 audit[2735]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb2f286c0c0 a2=0 a3=0 items=0 ppid=2711 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 key=(null) Oct 31 01:19:30.163000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:19:30.165000 audit[2736]: AVC avc: denied { watch } for pid=2736 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536941 scontext=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c929,c962 tclass=dir permissive=0 Oct 31 01:19:30.165000 audit[2736]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55a3323393b0 a2=2c8 a3=7ffddb863f7c items=0 ppid=2711 pid=2736 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 key=(null) Oct 31 01:19:30.165000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:19:30.168000 audit[2737]: AVC avc: denied { read } for pid=2737 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22168 scontext=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 31 01:19:30.168000 audit[2737]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f231276c320 a1=80000 a2=d a3=7ffecc2f1930 items=0 ppid=2711 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 key=(null) Oct 31 01:19:30.168000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:19:30.169000 audit[2737]: AVC avc: denied { search } for pid=2737 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23638 scontext=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:19:30.169000 audit[2737]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2311cc00c0 a2=0 a3=0 items=0 ppid=2711 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c929,c962 key=(null) Oct 31 01:19:30.169000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:19:30.554020 kubelet[1441]: E1031 01:19:30.553957 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:30.922856 env[1204]: time="2025-10-31T01:19:30.922748399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:19:31.006706 kubelet[1441]: I1031 01:19:31.006657 1441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.407089145 podStartE2EDuration="7.006642583s" podCreationTimestamp="2025-10-31 01:19:24 +0000 UTC" firstStartedPulling="2025-10-31 01:19:25.401008278 +0000 UTC m=+39.405996794" lastFinishedPulling="2025-10-31 01:19:30.000561706 +0000 UTC m=+44.005550232" observedRunningTime="2025-10-31 01:19:31.006152723 +0000 UTC m=+45.011141239" watchObservedRunningTime="2025-10-31 01:19:31.006642583 +0000 UTC m=+45.011631100" Oct 31 01:19:31.015000 audit[2757]: NETFILTER_CFG table=filter:88 family=2 entries=26 op=nft_register_rule pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:31.015000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc546f86f0 a2=0 a3=7ffc546f86dc items=0 ppid=1660 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:31.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:31.022000 audit[2757]: NETFILTER_CFG table=nat:89 family=2 entries=104 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:19:31.022000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc546f86f0 a2=0 a3=7ffc546f86dc items=0 ppid=1660 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:31.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:19:31.250897 env[1204]: time="2025-10-31T01:19:31.250830872Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:31.252034 env[1204]: time="2025-10-31T01:19:31.251983571Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:19:31.252237 kubelet[1441]: E1031 01:19:31.252190 1441 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:31.252303 kubelet[1441]: E1031 01:19:31.252243 1441 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:19:31.252419 kubelet[1441]: E1031 01:19:31.252383 1441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-snz7k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-6w5z2_calico-system(88903394-2d14-4910-8460-2f09dba7d264): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:31.254218 env[1204]: time="2025-10-31T01:19:31.254194923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:19:31.554484 kubelet[1441]: E1031 01:19:31.554334 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:31.742821 env[1204]: time="2025-10-31T01:19:31.742744079Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:19:31.744019 env[1204]: time="2025-10-31T01:19:31.743971159Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:19:31.744216 kubelet[1441]: E1031 01:19:31.744165 1441 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:31.744277 kubelet[1441]: E1031 01:19:31.744223 1441 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:19:31.744388 kubelet[1441]: E1031 01:19:31.744327 1441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-snz7k,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-6w5z2_calico-system(88903394-2d14-4910-8460-2f09dba7d264): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:19:31.745622 kubelet[1441]: E1031 01:19:31.745543 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:19:32.554945 kubelet[1441]: E1031 01:19:32.554892 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:33.555542 kubelet[1441]: E1031 01:19:33.555467 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:34.555682 kubelet[1441]: E1031 01:19:34.555633 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:35.556697 kubelet[1441]: E1031 01:19:35.556637 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:36.557547 kubelet[1441]: E1031 01:19:36.557494 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:37.558026 kubelet[1441]: E1031 01:19:37.557991 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:38.022612 kubelet[1441]: E1031 01:19:38.022583 1441 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:19:38.558308 kubelet[1441]: E1031 01:19:38.558271 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:39.559084 kubelet[1441]: E1031 01:19:39.559038 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:39.771098 systemd[1]: Created slice kubepods-besteffort-podd46e3872_9e6e_47ed_9621_b9138839af38.slice. Oct 31 01:19:39.840886 kubelet[1441]: I1031 01:19:39.840782 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-817cb83d-281e-42b2-bf19-87e48049907d\" (UniqueName: \"kubernetes.io/nfs/d46e3872-9e6e-47ed-9621-b9138839af38-pvc-817cb83d-281e-42b2-bf19-87e48049907d\") pod \"test-pod-1\" (UID: \"d46e3872-9e6e-47ed-9621-b9138839af38\") " pod="default/test-pod-1" Oct 31 01:19:39.840886 kubelet[1441]: I1031 01:19:39.840815 1441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-klctk\" (UniqueName: \"kubernetes.io/projected/d46e3872-9e6e-47ed-9621-b9138839af38-kube-api-access-klctk\") pod \"test-pod-1\" (UID: \"d46e3872-9e6e-47ed-9621-b9138839af38\") " pod="default/test-pod-1" Oct 31 01:19:39.954378 kernel: Failed to create system directory netfs Oct 31 01:19:39.954451 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 31 01:19:39.954470 kernel: audit: type=1400 audit(1761873579.949:743): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.954491 kernel: Failed to create system directory netfs Oct 31 01:19:39.949000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.954866 kernel: audit: type=1400 audit(1761873579.949:743): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.949000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.962432 kernel: Failed to create system directory netfs Oct 31 01:19:39.962471 kernel: audit: type=1400 audit(1761873579.949:743): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.949000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.970020 kernel: Failed to create system directory netfs Oct 31 01:19:39.970151 kernel: audit: type=1400 audit(1761873579.949:743): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.949000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.949000 audit[2785]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555bd102e5e0 a1=153bc a2=555b9a2c22b0 a3=5 items=0 ppid=484 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:39.949000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:19:39.996229 kernel: audit: type=1300 audit(1761873579.949:743): arch=c000003e syscall=175 success=yes exit=0 a0=555bd102e5e0 a1=153bc a2=555b9a2c22b0 a3=5 items=0 ppid=484 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:39.996284 kernel: audit: type=1327 audit(1761873579.949:743): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:19:39.996307 kernel: Failed to create system directory fscache Oct 31 01:19:39.996327 kernel: audit: type=1400 audit(1761873579.987:744): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.997651 kernel: Failed to create system directory fscache Oct 31 01:19:40.003794 kernel: audit: type=1400 audit(1761873579.987:744): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.013003 kernel: Failed to create system directory fscache Oct 31 01:19:40.013028 kernel: audit: type=1400 audit(1761873579.987:744): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.013052 kernel: Failed to create system directory fscache Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.020368 kernel: audit: type=1400 audit(1761873579.987:744): avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.020399 kernel: Failed to create system directory fscache Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.028504 kernel: Failed to create system directory fscache Oct 31 01:19:40.028537 kernel: Failed to create system directory fscache Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.031106 kernel: Failed to create system directory fscache Oct 31 01:19:40.031159 kernel: Failed to create system directory fscache Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.033703 kernel: Failed to create system directory fscache Oct 31 01:19:40.033732 kernel: Failed to create system directory fscache Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.036303 kernel: Failed to create system directory fscache Oct 31 01:19:40.036380 kernel: Failed to create system directory fscache Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:39.987000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.038890 kernel: Failed to create system directory fscache Oct 31 01:19:39.987000 audit[2785]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555bd12439c0 a1=4c0fc a2=555b9a2c22b0 a3=5 items=0 ppid=484 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.041467 kernel: FS-Cache: Loaded Oct 31 01:19:39.987000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.071952 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.071983 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.071998 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.074526 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.074554 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.077095 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.077133 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.079666 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.079704 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.082206 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.082235 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.084757 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.084785 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.087306 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.087364 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.089850 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.089882 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.093183 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.093233 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.095736 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.095768 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.098300 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.098338 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.101088 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.101141 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.103700 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.103741 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.106255 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.106294 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.108824 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.108863 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.111470 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.111498 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.114008 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.114034 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.116562 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.116594 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.119113 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.119144 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.121662 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.121689 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.124203 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.124225 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.126763 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.126785 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.129324 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.129369 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.131858 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.131878 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.134411 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.134437 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.136950 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.136970 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.139505 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.139537 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.142230 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.142251 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.144864 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.144925 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.147425 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.147448 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.150037 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.150082 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.152652 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.152690 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.155252 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.155292 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.157841 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.157982 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.160400 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.160429 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.162943 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.162972 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.165496 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.165526 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.168040 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.168068 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.170597 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.170619 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.173180 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.173210 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.175767 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.175799 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.178367 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.178393 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.180910 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.180939 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.183467 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.183492 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.186085 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.186109 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.188640 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.188675 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.191187 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.191219 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.193749 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.193780 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.196304 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.196339 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.198971 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.199048 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.201484 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.201529 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.203943 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.203978 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.206437 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.206481 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.208936 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.208977 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.211447 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.211491 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.213976 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.214000 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.216536 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.216563 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.219040 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.219072 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.221541 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.221563 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.224032 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.224054 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.226544 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.226577 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.229041 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.229073 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.059000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.231540 kernel: Failed to create system directory sunrpc Oct 31 01:19:40.242632 kernel: RPC: Registered named UNIX socket transport module. Oct 31 01:19:40.242676 kernel: RPC: Registered udp transport module. Oct 31 01:19:40.242694 kernel: RPC: Registered tcp transport module. Oct 31 01:19:40.243809 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 31 01:19:40.059000 audit[2785]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555bd128fad0 a1=1a8274 a2=555b9a2c22b0 a3=5 items=6 ppid=484 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.059000 audit: CWD cwd="/" Oct 31 01:19:40.059000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:40.059000 audit: PATH item=1 name=(null) inode=22253 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:40.059000 audit: PATH item=2 name=(null) inode=22253 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:40.059000 audit: PATH item=3 name=(null) inode=22254 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:40.059000 audit: PATH item=4 name=(null) inode=22253 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:40.059000 audit: PATH item=5 name=(null) inode=22255 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:19:40.059000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.280364 kernel: Failed to create system directory nfs Oct 31 01:19:40.280415 kernel: Failed to create system directory nfs Oct 31 01:19:40.280430 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.282687 kernel: Failed to create system directory nfs Oct 31 01:19:40.282706 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.285023 kernel: Failed to create system directory nfs Oct 31 01:19:40.285045 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.287370 kernel: Failed to create system directory nfs Oct 31 01:19:40.287392 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.289687 kernel: Failed to create system directory nfs Oct 31 01:19:40.289719 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.292006 kernel: Failed to create system directory nfs Oct 31 01:19:40.292024 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.294334 kernel: Failed to create system directory nfs Oct 31 01:19:40.294362 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.296666 kernel: Failed to create system directory nfs Oct 31 01:19:40.296686 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.299010 kernel: Failed to create system directory nfs Oct 31 01:19:40.299049 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.301344 kernel: Failed to create system directory nfs Oct 31 01:19:40.301382 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.303677 kernel: Failed to create system directory nfs Oct 31 01:19:40.303695 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.306013 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.307193 kernel: Failed to create system directory nfs Oct 31 01:19:40.307213 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.309530 kernel: Failed to create system directory nfs Oct 31 01:19:40.309584 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.311886 kernel: Failed to create system directory nfs Oct 31 01:19:40.311917 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.314211 kernel: Failed to create system directory nfs Oct 31 01:19:40.314232 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.316554 kernel: Failed to create system directory nfs Oct 31 01:19:40.316587 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.318888 kernel: Failed to create system directory nfs Oct 31 01:19:40.318921 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.321229 kernel: Failed to create system directory nfs Oct 31 01:19:40.321249 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.323568 kernel: Failed to create system directory nfs Oct 31 01:19:40.323592 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.325903 kernel: Failed to create system directory nfs Oct 31 01:19:40.325935 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.328243 kernel: Failed to create system directory nfs Oct 31 01:19:40.328277 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.330582 kernel: Failed to create system directory nfs Oct 31 01:19:40.330606 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.332911 kernel: Failed to create system directory nfs Oct 31 01:19:40.332939 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.335255 kernel: Failed to create system directory nfs Oct 31 01:19:40.335336 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.337631 kernel: Failed to create system directory nfs Oct 31 01:19:40.337666 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.339937 kernel: Failed to create system directory nfs Oct 31 01:19:40.339985 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.342272 kernel: Failed to create system directory nfs Oct 31 01:19:40.342317 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.344916 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.346397 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.347890 kernel: Failed to create system directory nfs Oct 31 01:19:40.270000 audit[2785]: AVC avc: denied { confidentiality } for pid=2785 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.349960 kernel: Failed to create system directory nfs Oct 31 01:19:40.371368 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 31 01:19:40.270000 audit[2785]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555bd14b0c10 a1=16eb2c a2=555b9a2c22b0 a3=5 items=0 ppid=484 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.270000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.408394 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.408439 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.408456 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.410801 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.410976 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.413177 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.413204 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.415598 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.415637 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.417978 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.418011 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.420389 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.420418 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.422765 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.422785 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.425173 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.425212 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.427636 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.427661 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.430056 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.430081 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.432485 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.432506 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.434891 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.434927 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.437389 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.437411 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.439797 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.439820 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.442204 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.442230 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.444626 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.444678 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.447044 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.447080 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.449473 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.449506 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.451883 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.451913 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.454301 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.454378 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.456724 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.456766 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.459134 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.459176 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.462764 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.462786 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.462799 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.465176 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.465212 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.467583 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.468794 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.468827 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.471201 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.471251 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.473617 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.473658 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.476023 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.476058 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.478453 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.478490 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.480855 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.480879 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.483250 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.483284 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.485697 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.485762 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.488086 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.488121 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.490496 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.491700 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.492905 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.492936 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.495294 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.495326 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.497722 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.497760 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.500131 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.500160 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.502607 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.503833 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.503857 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.506246 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.506287 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.508673 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.508706 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.511094 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.511197 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.513524 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.513545 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.515941 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.515977 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.518367 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.518403 kernel: Failed to create system directory nfs4 Oct 31 01:19:40.395000 audit[2791]: AVC avc: denied { confidentiality } for pid=2791 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.559211 kubelet[1441]: E1031 01:19:40.559171 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:40.654025 kernel: NFS: Registering the id_resolver key type Oct 31 01:19:40.654077 kernel: Key type id_resolver registered Oct 31 01:19:40.654092 kernel: Key type id_legacy registered Oct 31 01:19:40.395000 audit[2791]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe89e8b2010 a1=2095c4 a2=55a8e268f2b0 a3=5 items=0 ppid=484 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.395000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.668674 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.668781 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.668801 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.671123 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.671143 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.674867 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.674942 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.674958 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.677298 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.677319 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.679781 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.679807 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.682241 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.682260 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.684800 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.684819 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.687263 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.687285 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.689746 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.689786 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.692205 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.692225 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.694679 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.694699 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.697145 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.697170 kernel: Failed to create system directory rpcgss Oct 31 01:19:40.662000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:19:40.662000 audit[2792]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4e92127010 a1=70bf4 a2=5605598f32b0 a3=5 items=0 ppid=484 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.662000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 31 01:19:40.710485 nfsidmap[2800]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:19:40.713215 nfsidmap[2803]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:19:40.719000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:19:40.719000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:19:40.719000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:19:40.720000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:19:40.720000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5616b5129770 a2=10 a3=9aab5ee474a5c3f items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.720000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:19:40.720000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:19:40.720000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5616b5129770 a2=10 a3=9aab5ee474a5c3f items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.720000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:19:40.720000 audit[1266]: AVC avc: denied { watch_reads } for pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:19:40.720000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5616b5129770 a2=10 a3=9aab5ee474a5c3f items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:40.720000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:19:40.974025 env[1204]: time="2025-10-31T01:19:40.973981338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d46e3872-9e6e-47ed-9621-b9138839af38,Namespace:default,Attempt:0,}" Oct 31 01:19:41.059965 systemd-networkd[1032]: cali5ec59c6bf6e: Link UP Oct 31 01:19:41.069255 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:19:41.069437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 31 01:19:41.069646 systemd-networkd[1032]: cali5ec59c6bf6e: Gained carrier Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.011 [INFO][2806] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-test--pod--1-eth0 default d46e3872-9e6e-47ed-9621-b9138839af38 1432 0 2025-10-31 01:19:25 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.011 [INFO][2806] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.031 [INFO][2821] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" HandleID="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Workload="10.0.0.143-k8s-test--pod--1-eth0" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.032 [INFO][2821] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" HandleID="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Workload="10.0.0.143-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b5f60), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"test-pod-1", "timestamp":"2025-10-31 01:19:41.031986142 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.032 [INFO][2821] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.032 [INFO][2821] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.032 [INFO][2821] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.037 [INFO][2821] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.041 [INFO][2821] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.044 [INFO][2821] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.046 [INFO][2821] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.048 [INFO][2821] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.048 [INFO][2821] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.049 [INFO][2821] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7 Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.052 [INFO][2821] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.056 [INFO][2821] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.66.4/26] block=192.168.66.0/26 handle="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.056 [INFO][2821] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.4/26] handle="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" host="10.0.0.143" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.056 [INFO][2821] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.056 [INFO][2821] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.66.4/26] IPv6=[] ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" HandleID="k8s-pod-network.25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Workload="10.0.0.143-k8s-test--pod--1-eth0" Oct 31 01:19:41.076442 env[1204]: 2025-10-31 01:19:41.058 [INFO][2806] cni-plugin/k8s.go 418: Populated endpoint ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d46e3872-9e6e-47ed-9621-b9138839af38", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:41.077041 env[1204]: 2025-10-31 01:19:41.058 [INFO][2806] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.4/32] ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Oct 31 01:19:41.077041 env[1204]: 2025-10-31 01:19:41.058 [INFO][2806] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Oct 31 01:19:41.077041 env[1204]: 2025-10-31 01:19:41.065 [INFO][2806] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Oct 31 01:19:41.077041 env[1204]: 2025-10-31 01:19:41.069 [INFO][2806] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d46e3872-9e6e-47ed-9621-b9138839af38", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2a:3e:d4:d0:a0:57", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:41.077041 env[1204]: 2025-10-31 01:19:41.074 [INFO][2806] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Oct 31 01:19:41.084000 audit[2838]: NETFILTER_CFG table=filter:90 family=2 entries=40 op=nft_register_chain pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:19:41.084000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff794930e0 a2=0 a3=7fff794930cc items=0 ppid=2121 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.084000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:19:41.090252 env[1204]: time="2025-10-31T01:19:41.090186764Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:19:41.090252 env[1204]: time="2025-10-31T01:19:41.090224847Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:19:41.090252 env[1204]: time="2025-10-31T01:19:41.090234528Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:19:41.090570 env[1204]: time="2025-10-31T01:19:41.090514763Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7 pid=2846 runtime=io.containerd.runc.v2 Oct 31 01:19:41.104427 systemd[1]: Started cri-containerd-25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7.scope. Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit: BPF prog-id=120 op=LOAD Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=2846 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646462373430636133346637353566333034623362323231303634 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=2846 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646462373430636133346637353566333034623362323231303634 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.111000 audit: BPF prog-id=121 op=LOAD Oct 31 01:19:41.111000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c0003ee000 items=0 ppid=2846 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646462373430636133346637353566333034623362323231303634 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit: BPF prog-id=122 op=LOAD Oct 31 01:19:41.112000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c0003ee048 items=0 ppid=2846 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646462373430636133346637353566333034623362323231303634 Oct 31 01:19:41.112000 audit: BPF prog-id=122 op=UNLOAD Oct 31 01:19:41.112000 audit: BPF prog-id=121 op=UNLOAD Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.112000 audit: BPF prog-id=123 op=LOAD Oct 31 01:19:41.112000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c0003ee458 items=0 ppid=2846 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646462373430636133346637353566333034623362323231303634 Oct 31 01:19:41.114179 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:19:41.134250 env[1204]: time="2025-10-31T01:19:41.133195748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d46e3872-9e6e-47ed-9621-b9138839af38,Namespace:default,Attempt:0,} returns sandbox id \"25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7\"" Oct 31 01:19:41.134331 env[1204]: time="2025-10-31T01:19:41.134235565Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:19:41.478875 env[1204]: time="2025-10-31T01:19:41.478830843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:41.480912 env[1204]: time="2025-10-31T01:19:41.480869488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:41.483517 env[1204]: time="2025-10-31T01:19:41.483480327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:41.486137 env[1204]: time="2025-10-31T01:19:41.486100558Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:19:41.487011 env[1204]: time="2025-10-31T01:19:41.486971470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:19:41.488514 env[1204]: time="2025-10-31T01:19:41.488485370Z" level=info msg="CreateContainer within sandbox \"25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 31 01:19:41.500998 env[1204]: time="2025-10-31T01:19:41.500962986Z" level=info msg="CreateContainer within sandbox \"25ddb740ca34f755f304b3b22106474edd4dfa57b951d3578005790feac871f7\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0554396f964929ef148c928c81663f36c08fa9396b868cf18563a22fb70f22d3\"" Oct 31 01:19:41.501383 env[1204]: time="2025-10-31T01:19:41.501342947Z" level=info msg="StartContainer for \"0554396f964929ef148c928c81663f36c08fa9396b868cf18563a22fb70f22d3\"" Oct 31 01:19:41.514495 systemd[1]: Started cri-containerd-0554396f964929ef148c928c81663f36c08fa9396b868cf18563a22fb70f22d3.scope. Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit: BPF prog-id=124 op=LOAD Oct 31 01:19:41.529000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.529000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2846 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353433393666393634393239656631343863393238633831363633 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2846 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353433393666393634393239656631343863393238633831363633 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit: BPF prog-id=125 op=LOAD Oct 31 01:19:41.530000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000211150 items=0 ppid=2846 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353433393666393634393239656631343863393238633831363633 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit: BPF prog-id=126 op=LOAD Oct 31 01:19:41.530000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000211198 items=0 ppid=2846 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353433393666393634393239656631343863393238633831363633 Oct 31 01:19:41.530000 audit: BPF prog-id=126 op=UNLOAD Oct 31 01:19:41.530000 audit: BPF prog-id=125 op=UNLOAD Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:19:41.530000 audit: BPF prog-id=127 op=LOAD Oct 31 01:19:41.530000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002115a8 items=0 ppid=2846 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:19:41.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035353433393666393634393239656631343863393238633831363633 Oct 31 01:19:41.543222 env[1204]: time="2025-10-31T01:19:41.543175740Z" level=info msg="StartContainer for \"0554396f964929ef148c928c81663f36c08fa9396b868cf18563a22fb70f22d3\" returns successfully" Oct 31 01:19:41.560014 kubelet[1441]: E1031 01:19:41.559964 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:42.024231 kubelet[1441]: I1031 01:19:42.024170 1441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.67087375 podStartE2EDuration="17.024154232s" podCreationTimestamp="2025-10-31 01:19:25 +0000 UTC" firstStartedPulling="2025-10-31 01:19:41.133911414 +0000 UTC m=+55.138899930" lastFinishedPulling="2025-10-31 01:19:41.487191896 +0000 UTC m=+55.492180412" observedRunningTime="2025-10-31 01:19:42.023804821 +0000 UTC m=+56.028793337" watchObservedRunningTime="2025-10-31 01:19:42.024154232 +0000 UTC m=+56.029142738" Oct 31 01:19:42.560465 kubelet[1441]: E1031 01:19:42.560426 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:42.733498 systemd-networkd[1032]: cali5ec59c6bf6e: Gained IPv6LL Oct 31 01:19:43.561422 kubelet[1441]: E1031 01:19:43.561379 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:43.922630 kubelet[1441]: E1031 01:19:43.922541 1441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-6w5z2" podUID="88903394-2d14-4910-8460-2f09dba7d264" Oct 31 01:19:44.561804 kubelet[1441]: E1031 01:19:44.561770 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:45.561894 kubelet[1441]: E1031 01:19:45.561862 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:46.526648 kubelet[1441]: E1031 01:19:46.526622 1441 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:46.548497 env[1204]: time="2025-10-31T01:19:46.548461659Z" level=info msg="StopPodSandbox for \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\"" Oct 31 01:19:46.562323 kubelet[1441]: E1031 01:19:46.562292 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.574 [WARNING][2947] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6w5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88903394-2d14-4910-8460-2f09dba7d264", ResourceVersion:"1458", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8", Pod:"csi-node-driver-6w5z2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia8e21e0c121", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.575 [INFO][2947] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.575 [INFO][2947] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" iface="eth0" netns="" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.575 [INFO][2947] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.575 [INFO][2947] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.591 [INFO][2956] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.591 [INFO][2956] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.591 [INFO][2956] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.596 [WARNING][2956] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.596 [INFO][2956] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.597 [INFO][2956] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:46.599581 env[1204]: 2025-10-31 01:19:46.598 [INFO][2947] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.600053 env[1204]: time="2025-10-31T01:19:46.599596185Z" level=info msg="TearDown network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\" successfully" Oct 31 01:19:46.600053 env[1204]: time="2025-10-31T01:19:46.599623713Z" level=info msg="StopPodSandbox for \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\" returns successfully" Oct 31 01:19:46.600168 env[1204]: time="2025-10-31T01:19:46.600127569Z" level=info msg="RemovePodSandbox for \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\"" Oct 31 01:19:46.600211 env[1204]: time="2025-10-31T01:19:46.600168917Z" level=info msg="Forcibly stopping sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\"" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.627 [WARNING][2973] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6w5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88903394-2d14-4910-8460-2f09dba7d264", ResourceVersion:"1458", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 18, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"4f7e18d896172648808a2ab990ecacca972c489d994eafebf65ab3c921f905c8", Pod:"csi-node-driver-6w5z2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia8e21e0c121", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.627 [INFO][2973] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.627 [INFO][2973] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" iface="eth0" netns="" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.627 [INFO][2973] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.627 [INFO][2973] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.643 [INFO][2983] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.643 [INFO][2983] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.643 [INFO][2983] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.648 [WARNING][2983] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.648 [INFO][2983] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" HandleID="k8s-pod-network.2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Workload="10.0.0.143-k8s-csi--node--driver--6w5z2-eth0" Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.649 [INFO][2983] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:46.652175 env[1204]: 2025-10-31 01:19:46.650 [INFO][2973] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161" Oct 31 01:19:46.652633 env[1204]: time="2025-10-31T01:19:46.652190990Z" level=info msg="TearDown network for sandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\" successfully" Oct 31 01:19:46.655183 env[1204]: time="2025-10-31T01:19:46.655145893Z" level=info msg="RemovePodSandbox \"2e4cb2680d2d7faa65acb5e7a7a473e9f33bc6f0b43b3f9aac409076ecf30161\" returns successfully" Oct 31 01:19:46.655774 env[1204]: time="2025-10-31T01:19:46.655730550Z" level=info msg="StopPodSandbox for \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\"" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.684 [WARNING][3000] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7a43691e-702f-4ff3-8020-97a17c342bc7", ResourceVersion:"1295", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f", Pod:"nginx-deployment-7fcdb87857-7kvg5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c3745d66ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.684 [INFO][3000] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.684 [INFO][3000] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" iface="eth0" netns="" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.684 [INFO][3000] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.684 [INFO][3000] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.701 [INFO][3008] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.702 [INFO][3008] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.702 [INFO][3008] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.707 [WARNING][3008] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.707 [INFO][3008] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.709 [INFO][3008] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:46.711677 env[1204]: 2025-10-31 01:19:46.710 [INFO][3000] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.711677 env[1204]: time="2025-10-31T01:19:46.711664881Z" level=info msg="TearDown network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\" successfully" Oct 31 01:19:46.712131 env[1204]: time="2025-10-31T01:19:46.711696618Z" level=info msg="StopPodSandbox for \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\" returns successfully" Oct 31 01:19:46.712800 env[1204]: time="2025-10-31T01:19:46.712770600Z" level=info msg="RemovePodSandbox for \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\"" Oct 31 01:19:46.712852 env[1204]: time="2025-10-31T01:19:46.712805093Z" level=info msg="Forcibly stopping sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\"" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.740 [WARNING][3026] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7a43691e-702f-4ff3-8020-97a17c342bc7", ResourceVersion:"1295", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 19, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"2e3fe7a1fea1d3f270569942fda59a669268a3d21e2ce420920e576074e9081f", Pod:"nginx-deployment-7fcdb87857-7kvg5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c3745d66ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.740 [INFO][3026] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.740 [INFO][3026] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" iface="eth0" netns="" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.740 [INFO][3026] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.740 [INFO][3026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.756 [INFO][3034] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.757 [INFO][3034] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.757 [INFO][3034] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.762 [WARNING][3034] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.762 [INFO][3034] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" HandleID="k8s-pod-network.215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Workload="10.0.0.143-k8s-nginx--deployment--7fcdb87857--7kvg5-eth0" Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.763 [INFO][3034] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:19:46.766150 env[1204]: 2025-10-31 01:19:46.764 [INFO][3026] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020" Oct 31 01:19:46.766654 env[1204]: time="2025-10-31T01:19:46.766151209Z" level=info msg="TearDown network for sandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\" successfully" Oct 31 01:19:46.769414 env[1204]: time="2025-10-31T01:19:46.769383838Z" level=info msg="RemovePodSandbox \"215681713d7b45f7f23eaf7125ea17a0458b3165b5ccf66ce87ad058391c4020\" returns successfully" Oct 31 01:19:47.563153 kubelet[1441]: E1031 01:19:47.563111 1441 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"