Oct 31 01:06:57.386112 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 01:06:57.386141 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:06:57.386162 kernel: BIOS-provided physical RAM map: Oct 31 01:06:57.386174 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 31 01:06:57.386186 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Oct 31 01:06:57.386199 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Oct 31 01:06:57.386231 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Oct 31 01:06:57.386247 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Oct 31 01:06:57.386260 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Oct 31 01:06:57.386276 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Oct 31 01:06:57.386288 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Oct 31 01:06:57.386301 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Oct 31 01:06:57.386312 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Oct 31 01:06:57.386326 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Oct 31 01:06:57.386341 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Oct 31 01:06:57.386360 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Oct 31 01:06:57.386373 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Oct 31 01:06:57.386385 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 31 01:06:57.386398 kernel: NX (Execute Disable) protection: active Oct 31 01:06:57.386414 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Oct 31 01:06:57.386430 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Oct 31 01:06:57.386444 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Oct 31 01:06:57.386454 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Oct 31 01:06:57.386468 kernel: extended physical RAM map: Oct 31 01:06:57.386481 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 31 01:06:57.386500 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Oct 31 01:06:57.386511 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Oct 31 01:06:57.386526 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Oct 31 01:06:57.386539 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Oct 31 01:06:57.386551 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Oct 31 01:06:57.386565 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Oct 31 01:06:57.386578 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Oct 31 01:06:57.386590 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Oct 31 01:06:57.386604 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Oct 31 01:06:57.386617 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Oct 31 01:06:57.386629 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Oct 31 01:06:57.386647 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Oct 31 01:06:57.386661 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Oct 31 01:06:57.386674 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Oct 31 01:06:57.386688 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Oct 31 01:06:57.386708 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Oct 31 01:06:57.386733 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Oct 31 01:06:57.386747 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 31 01:06:57.386769 kernel: efi: EFI v2.70 by EDK II Oct 31 01:06:57.386782 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Oct 31 01:06:57.386797 kernel: random: crng init done Oct 31 01:06:57.386815 kernel: SMBIOS 2.8 present. Oct 31 01:06:57.386831 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Oct 31 01:06:57.386848 kernel: Hypervisor detected: KVM Oct 31 01:06:57.386866 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 31 01:06:57.386884 kernel: kvm-clock: cpu 0, msr 4e1a0001, primary cpu clock Oct 31 01:06:57.386897 kernel: kvm-clock: using sched offset of 5854328628 cycles Oct 31 01:06:57.386916 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 31 01:06:57.386932 kernel: tsc: Detected 2794.748 MHz processor Oct 31 01:06:57.386946 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 01:06:57.386966 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 01:06:57.386977 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Oct 31 01:06:57.386993 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 01:06:57.387008 kernel: Using GB pages for direct mapping Oct 31 01:06:57.387023 kernel: Secure boot disabled Oct 31 01:06:57.387034 kernel: ACPI: Early table checksum verification disabled Oct 31 01:06:57.387055 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Oct 31 01:06:57.387069 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Oct 31 01:06:57.387083 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:06:57.387095 kernel: ACPI: DSDT 0x000000009CB7A000 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:06:57.387111 kernel: ACPI: FACS 0x000000009CBDD000 000040 Oct 31 01:06:57.387128 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:06:57.387141 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:06:57.387157 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:06:57.387172 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 01:06:57.387191 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Oct 31 01:06:57.387206 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Oct 31 01:06:57.387240 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1b9] Oct 31 01:06:57.387251 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Oct 31 01:06:57.387264 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Oct 31 01:06:57.387276 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Oct 31 01:06:57.387331 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Oct 31 01:06:57.387350 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Oct 31 01:06:57.387364 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Oct 31 01:06:57.387386 kernel: No NUMA configuration found Oct 31 01:06:57.387403 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Oct 31 01:06:57.387419 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Oct 31 01:06:57.387432 kernel: Zone ranges: Oct 31 01:06:57.387449 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 01:06:57.387467 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Oct 31 01:06:57.387481 kernel: Normal empty Oct 31 01:06:57.387497 kernel: Movable zone start for each node Oct 31 01:06:57.387512 kernel: Early memory node ranges Oct 31 01:06:57.387533 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Oct 31 01:06:57.387549 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Oct 31 01:06:57.387565 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Oct 31 01:06:57.387579 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Oct 31 01:06:57.387595 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Oct 31 01:06:57.387612 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Oct 31 01:06:57.387627 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Oct 31 01:06:57.387643 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 01:06:57.387658 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Oct 31 01:06:57.387674 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Oct 31 01:06:57.387695 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 01:06:57.387722 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Oct 31 01:06:57.387737 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Oct 31 01:06:57.387751 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Oct 31 01:06:57.387765 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 31 01:06:57.387781 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 31 01:06:57.387797 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 31 01:06:57.387813 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 31 01:06:57.387829 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 31 01:06:57.387849 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 31 01:06:57.387863 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 31 01:06:57.387880 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 31 01:06:57.387895 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 01:06:57.387928 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 31 01:06:57.387961 kernel: TSC deadline timer available Oct 31 01:06:57.388051 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Oct 31 01:06:57.388068 kernel: kvm-guest: KVM setup pv remote TLB flush Oct 31 01:06:57.388085 kernel: kvm-guest: setup PV sched yield Oct 31 01:06:57.388106 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Oct 31 01:06:57.388123 kernel: Booting paravirtualized kernel on KVM Oct 31 01:06:57.388150 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 01:06:57.388171 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Oct 31 01:06:57.388187 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Oct 31 01:06:57.388204 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Oct 31 01:06:57.388257 kernel: pcpu-alloc: [0] 0 1 2 3 Oct 31 01:06:57.388276 kernel: kvm-guest: setup async PF for cpu 0 Oct 31 01:06:57.388291 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Oct 31 01:06:57.388309 kernel: kvm-guest: PV spinlocks enabled Oct 31 01:06:57.388325 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 31 01:06:57.388341 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Oct 31 01:06:57.388378 kernel: Policy zone: DMA32 Oct 31 01:06:57.388394 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:06:57.388412 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 01:06:57.388429 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 31 01:06:57.388451 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 01:06:57.388466 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 01:06:57.388484 kernel: Memory: 2397432K/2567000K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 169308K reserved, 0K cma-reserved) Oct 31 01:06:57.388501 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 31 01:06:57.388516 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 01:06:57.388533 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 01:06:57.388550 kernel: rcu: Hierarchical RCU implementation. Oct 31 01:06:57.388566 kernel: rcu: RCU event tracing is enabled. Oct 31 01:06:57.388583 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 31 01:06:57.388616 kernel: Rude variant of Tasks RCU enabled. Oct 31 01:06:57.388636 kernel: Tracing variant of Tasks RCU enabled. Oct 31 01:06:57.388653 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 01:06:57.388669 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 31 01:06:57.388686 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Oct 31 01:06:57.388703 kernel: Console: colour dummy device 80x25 Oct 31 01:06:57.388738 kernel: printk: console [ttyS0] enabled Oct 31 01:06:57.388751 kernel: ACPI: Core revision 20210730 Oct 31 01:06:57.388767 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Oct 31 01:06:57.388788 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 01:06:57.388804 kernel: x2apic enabled Oct 31 01:06:57.388820 kernel: Switched APIC routing to physical x2apic. Oct 31 01:06:57.388837 kernel: kvm-guest: setup PV IPIs Oct 31 01:06:57.388852 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 31 01:06:57.388869 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 31 01:06:57.388886 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Oct 31 01:06:57.388902 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 31 01:06:57.388919 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 31 01:06:57.388947 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 31 01:06:57.388967 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 01:06:57.388984 kernel: Spectre V2 : Mitigation: Retpolines Oct 31 01:06:57.389003 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 31 01:06:57.389020 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 31 01:06:57.389035 kernel: active return thunk: retbleed_return_thunk Oct 31 01:06:57.389052 kernel: RETBleed: Mitigation: untrained return thunk Oct 31 01:06:57.389070 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 01:06:57.389086 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 01:06:57.389107 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 01:06:57.389125 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 01:06:57.389141 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 01:06:57.389158 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 01:06:57.389175 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 31 01:06:57.389193 kernel: Freeing SMP alternatives memory: 32K Oct 31 01:06:57.389208 kernel: pid_max: default: 32768 minimum: 301 Oct 31 01:06:57.389243 kernel: LSM: Security Framework initializing Oct 31 01:06:57.389258 kernel: SELinux: Initializing. Oct 31 01:06:57.389280 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 01:06:57.389297 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 31 01:06:57.389312 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 31 01:06:57.389330 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 31 01:06:57.389348 kernel: ... version: 0 Oct 31 01:06:57.389363 kernel: ... bit width: 48 Oct 31 01:06:57.389380 kernel: ... generic registers: 6 Oct 31 01:06:57.389397 kernel: ... value mask: 0000ffffffffffff Oct 31 01:06:57.389412 kernel: ... max period: 00007fffffffffff Oct 31 01:06:57.389434 kernel: ... fixed-purpose events: 0 Oct 31 01:06:57.389451 kernel: ... event mask: 000000000000003f Oct 31 01:06:57.389468 kernel: signal: max sigframe size: 1776 Oct 31 01:06:57.389482 kernel: rcu: Hierarchical SRCU implementation. Oct 31 01:06:57.389499 kernel: smp: Bringing up secondary CPUs ... Oct 31 01:06:57.389516 kernel: x86: Booting SMP configuration: Oct 31 01:06:57.389531 kernel: .... node #0, CPUs: #1 Oct 31 01:06:57.389548 kernel: kvm-clock: cpu 1, msr 4e1a0041, secondary cpu clock Oct 31 01:06:57.389565 kernel: kvm-guest: setup async PF for cpu 1 Oct 31 01:06:57.389584 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Oct 31 01:06:57.389602 kernel: #2 Oct 31 01:06:57.389619 kernel: kvm-clock: cpu 2, msr 4e1a0081, secondary cpu clock Oct 31 01:06:57.389634 kernel: kvm-guest: setup async PF for cpu 2 Oct 31 01:06:57.389651 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Oct 31 01:06:57.389667 kernel: #3 Oct 31 01:06:57.389682 kernel: kvm-clock: cpu 3, msr 4e1a00c1, secondary cpu clock Oct 31 01:06:57.389699 kernel: kvm-guest: setup async PF for cpu 3 Oct 31 01:06:57.389726 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Oct 31 01:06:57.389743 kernel: smp: Brought up 1 node, 4 CPUs Oct 31 01:06:57.389762 kernel: smpboot: Max logical packages: 1 Oct 31 01:06:57.389783 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Oct 31 01:06:57.389802 kernel: devtmpfs: initialized Oct 31 01:06:57.389823 kernel: x86/mm: Memory block size: 128MB Oct 31 01:06:57.389845 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Oct 31 01:06:57.389864 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Oct 31 01:06:57.389885 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Oct 31 01:06:57.389906 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Oct 31 01:06:57.389926 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Oct 31 01:06:57.389943 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 01:06:57.389961 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 31 01:06:57.389976 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 01:06:57.389993 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 01:06:57.390010 kernel: audit: initializing netlink subsys (disabled) Oct 31 01:06:57.390027 kernel: audit: type=2000 audit(1761872816.682:1): state=initialized audit_enabled=0 res=1 Oct 31 01:06:57.390042 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 01:06:57.390059 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 01:06:57.390079 kernel: cpuidle: using governor menu Oct 31 01:06:57.390095 kernel: ACPI: bus type PCI registered Oct 31 01:06:57.390111 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 01:06:57.390128 kernel: dca service started, version 1.12.1 Oct 31 01:06:57.390144 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 31 01:06:57.390161 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 31 01:06:57.390178 kernel: PCI: Using configuration type 1 for base access Oct 31 01:06:57.390194 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 01:06:57.390212 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 01:06:57.390247 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 01:06:57.390263 kernel: ACPI: Added _OSI(Module Device) Oct 31 01:06:57.390281 kernel: ACPI: Added _OSI(Processor Device) Oct 31 01:06:57.390296 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 01:06:57.390313 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 01:06:57.390330 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 01:06:57.390345 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 01:06:57.390362 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 01:06:57.390379 kernel: ACPI: Interpreter enabled Oct 31 01:06:57.390399 kernel: ACPI: PM: (supports S0 S3 S5) Oct 31 01:06:57.390414 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 01:06:57.390430 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 01:06:57.390448 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 31 01:06:57.390462 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 31 01:06:57.390731 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 01:06:57.390918 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Oct 31 01:06:57.391143 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Oct 31 01:06:57.391169 kernel: PCI host bridge to bus 0000:00 Oct 31 01:06:57.391392 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 01:06:57.391552 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 31 01:06:57.391704 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 01:06:57.391874 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Oct 31 01:06:57.392025 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 01:06:57.392175 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Oct 31 01:06:57.392352 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 31 01:06:57.392541 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 31 01:06:57.392733 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Oct 31 01:06:57.392923 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Oct 31 01:06:57.393177 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Oct 31 01:06:57.393363 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Oct 31 01:06:57.393482 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Oct 31 01:06:57.393603 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 01:06:57.393742 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Oct 31 01:06:57.393851 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Oct 31 01:06:57.393961 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Oct 31 01:06:57.394058 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Oct 31 01:06:57.394161 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Oct 31 01:06:57.394312 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Oct 31 01:06:57.394410 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Oct 31 01:06:57.394506 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Oct 31 01:06:57.394625 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Oct 31 01:06:57.394734 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Oct 31 01:06:57.394845 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Oct 31 01:06:57.394971 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Oct 31 01:06:57.395091 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Oct 31 01:06:57.395200 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 31 01:06:57.395321 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 31 01:06:57.395423 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 31 01:06:57.395534 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Oct 31 01:06:57.395687 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Oct 31 01:06:57.395866 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 31 01:06:57.396027 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Oct 31 01:06:57.396048 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 31 01:06:57.396063 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 31 01:06:57.396079 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 01:06:57.396094 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 31 01:06:57.396110 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 31 01:06:57.396125 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 31 01:06:57.396139 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 31 01:06:57.396160 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 31 01:06:57.396173 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 31 01:06:57.396191 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 31 01:06:57.396208 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 31 01:06:57.396238 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 31 01:06:57.396252 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 31 01:06:57.396268 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 31 01:06:57.396284 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 31 01:06:57.396299 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 31 01:06:57.396319 kernel: iommu: Default domain type: Translated Oct 31 01:06:57.396336 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 01:06:57.398012 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 31 01:06:57.398117 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 01:06:57.398729 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 31 01:06:57.398743 kernel: vgaarb: loaded Oct 31 01:06:57.398751 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 01:06:57.398759 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 01:06:57.398772 kernel: PTP clock support registered Oct 31 01:06:57.398780 kernel: Registered efivars operations Oct 31 01:06:57.398787 kernel: PCI: Using ACPI for IRQ routing Oct 31 01:06:57.398794 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 01:06:57.398802 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Oct 31 01:06:57.398809 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Oct 31 01:06:57.398818 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Oct 31 01:06:57.398826 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Oct 31 01:06:57.398834 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Oct 31 01:06:57.398844 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Oct 31 01:06:57.398851 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Oct 31 01:06:57.398859 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Oct 31 01:06:57.398866 kernel: clocksource: Switched to clocksource kvm-clock Oct 31 01:06:57.398873 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 01:06:57.398881 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 01:06:57.398888 kernel: pnp: PnP ACPI init Oct 31 01:06:57.398987 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 31 01:06:57.399003 kernel: pnp: PnP ACPI: found 6 devices Oct 31 01:06:57.399011 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 01:06:57.399018 kernel: NET: Registered PF_INET protocol family Oct 31 01:06:57.399025 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 31 01:06:57.399033 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 31 01:06:57.399040 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 01:06:57.399047 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 01:06:57.399054 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 31 01:06:57.399061 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 31 01:06:57.399071 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 01:06:57.399078 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 31 01:06:57.399085 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 01:06:57.399092 kernel: NET: Registered PF_XDP protocol family Oct 31 01:06:57.399169 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Oct 31 01:06:57.399253 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Oct 31 01:06:57.399323 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 31 01:06:57.399385 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 31 01:06:57.399450 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 31 01:06:57.399509 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Oct 31 01:06:57.399568 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 31 01:06:57.399637 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Oct 31 01:06:57.399647 kernel: PCI: CLS 0 bytes, default 64 Oct 31 01:06:57.399655 kernel: Initialise system trusted keyrings Oct 31 01:06:57.399664 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 31 01:06:57.399678 kernel: Key type asymmetric registered Oct 31 01:06:57.399689 kernel: Asymmetric key parser 'x509' registered Oct 31 01:06:57.399702 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 01:06:57.399720 kernel: io scheduler mq-deadline registered Oct 31 01:06:57.399740 kernel: io scheduler kyber registered Oct 31 01:06:57.399749 kernel: io scheduler bfq registered Oct 31 01:06:57.399756 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 01:06:57.399764 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 31 01:06:57.399772 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 31 01:06:57.399779 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 31 01:06:57.399787 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 01:06:57.399796 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 01:06:57.399803 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 31 01:06:57.399811 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 01:06:57.399818 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 01:06:57.399900 kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 31 01:06:57.399911 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 01:06:57.399972 kernel: rtc_cmos 00:04: registered as rtc0 Oct 31 01:06:57.400046 kernel: rtc_cmos 00:04: setting system clock to 2025-10-31T01:06:56 UTC (1761872816) Oct 31 01:06:57.400113 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Oct 31 01:06:57.400122 kernel: efifb: probing for efifb Oct 31 01:06:57.400130 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Oct 31 01:06:57.400138 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Oct 31 01:06:57.400145 kernel: efifb: scrolling: redraw Oct 31 01:06:57.400155 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 31 01:06:57.400163 kernel: Console: switching to colour frame buffer device 160x50 Oct 31 01:06:57.400170 kernel: fb0: EFI VGA frame buffer device Oct 31 01:06:57.400177 kernel: pstore: Registered efi as persistent store backend Oct 31 01:06:57.400186 kernel: NET: Registered PF_INET6 protocol family Oct 31 01:06:57.400194 kernel: Segment Routing with IPv6 Oct 31 01:06:57.400201 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 01:06:57.400210 kernel: NET: Registered PF_PACKET protocol family Oct 31 01:06:57.400230 kernel: Key type dns_resolver registered Oct 31 01:06:57.400239 kernel: IPI shorthand broadcast: enabled Oct 31 01:06:57.400247 kernel: sched_clock: Marking stable (623768353, 262464486)->(1098759456, -212526617) Oct 31 01:06:57.400254 kernel: registered taskstats version 1 Oct 31 01:06:57.400261 kernel: Loading compiled-in X.509 certificates Oct 31 01:06:57.400269 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 01:06:57.400277 kernel: Key type .fscrypt registered Oct 31 01:06:57.400284 kernel: Key type fscrypt-provisioning registered Oct 31 01:06:57.400292 kernel: pstore: Using crash dump compression: deflate Oct 31 01:06:57.400300 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 01:06:57.400308 kernel: ima: Allocated hash algorithm: sha1 Oct 31 01:06:57.400316 kernel: ima: No architecture policies found Oct 31 01:06:57.400323 kernel: clk: Disabling unused clocks Oct 31 01:06:57.400331 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 01:06:57.400338 kernel: Write protecting the kernel read-only data: 28672k Oct 31 01:06:57.400346 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 01:06:57.400353 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 01:06:57.400361 kernel: Run /init as init process Oct 31 01:06:57.400368 kernel: with arguments: Oct 31 01:06:57.400377 kernel: /init Oct 31 01:06:57.400384 kernel: with environment: Oct 31 01:06:57.400391 kernel: HOME=/ Oct 31 01:06:57.400399 kernel: TERM=linux Oct 31 01:06:57.400406 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 01:06:57.400416 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:06:57.400427 systemd[1]: Detected virtualization kvm. Oct 31 01:06:57.400435 systemd[1]: Detected architecture x86-64. Oct 31 01:06:57.400444 systemd[1]: Running in initrd. Oct 31 01:06:57.400451 systemd[1]: No hostname configured, using default hostname. Oct 31 01:06:57.400459 systemd[1]: Hostname set to . Oct 31 01:06:57.400467 systemd[1]: Initializing machine ID from VM UUID. Oct 31 01:06:57.400475 systemd[1]: Queued start job for default target initrd.target. Oct 31 01:06:57.400486 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:06:57.400493 systemd[1]: Reached target cryptsetup.target. Oct 31 01:06:57.400501 systemd[1]: Reached target paths.target. Oct 31 01:06:57.400510 systemd[1]: Reached target slices.target. Oct 31 01:06:57.400517 systemd[1]: Reached target swap.target. Oct 31 01:06:57.400525 systemd[1]: Reached target timers.target. Oct 31 01:06:57.400533 systemd[1]: Listening on iscsid.socket. Oct 31 01:06:57.400541 systemd[1]: Listening on iscsiuio.socket. Oct 31 01:06:57.400549 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 01:06:57.400557 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 01:06:57.400564 systemd[1]: Listening on systemd-journald.socket. Oct 31 01:06:57.400573 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:06:57.400581 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:06:57.400589 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:06:57.400597 systemd[1]: Reached target sockets.target. Oct 31 01:06:57.400604 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:06:57.400612 systemd[1]: Finished network-cleanup.service. Oct 31 01:06:57.400620 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 01:06:57.400628 systemd[1]: Starting systemd-journald.service... Oct 31 01:06:57.400635 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:06:57.400644 systemd[1]: Starting systemd-resolved.service... Oct 31 01:06:57.400652 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 01:06:57.400660 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:06:57.400667 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 01:06:57.400676 kernel: audit: type=1130 audit(1761872817.387:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.400684 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 01:06:57.400692 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 01:06:57.400706 systemd-journald[198]: Journal started Oct 31 01:06:57.400763 systemd-journald[198]: Runtime Journal (/run/log/journal/eeaec3f75978499fb30f5c3112c7e6af) is 6.0M, max 48.4M, 42.4M free. Oct 31 01:06:57.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.408444 systemd[1]: Started systemd-journald.service. Oct 31 01:06:57.408479 kernel: audit: type=1130 audit(1761872817.400:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.434961 systemd-modules-load[199]: Inserted module 'overlay' Oct 31 01:06:57.435833 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 01:06:57.447704 kernel: audit: type=1130 audit(1761872817.434:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.448978 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 01:06:57.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.457101 systemd-resolved[200]: Positive Trust Anchors: Oct 31 01:06:57.460272 kernel: audit: type=1130 audit(1761872817.452:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.457111 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:06:57.457143 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:06:57.460528 systemd-resolved[200]: Defaulting to hostname 'linux'. Oct 31 01:06:57.461430 systemd[1]: Started systemd-resolved.service. Oct 31 01:06:57.461559 systemd[1]: Reached target nss-lookup.target. Oct 31 01:06:57.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.468246 kernel: audit: type=1130 audit(1761872817.461:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.491254 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 01:06:57.491511 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 01:06:57.499592 kernel: audit: type=1130 audit(1761872817.492:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.499577 systemd[1]: Starting dracut-cmdline.service... Oct 31 01:06:57.503676 systemd-modules-load[199]: Inserted module 'br_netfilter' Oct 31 01:06:57.505309 kernel: Bridge firewalling registered Oct 31 01:06:57.511628 dracut-cmdline[216]: dracut-dracut-053 Oct 31 01:06:57.513593 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 01:06:57.524249 kernel: SCSI subsystem initialized Oct 31 01:06:57.538623 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 01:06:57.538698 kernel: device-mapper: uevent: version 1.0.3 Oct 31 01:06:57.538728 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 01:06:57.543891 systemd-modules-load[199]: Inserted module 'dm_multipath' Oct 31 01:06:57.545459 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:06:57.553464 kernel: audit: type=1130 audit(1761872817.546:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.547437 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:06:57.560060 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:06:57.567831 kernel: audit: type=1130 audit(1761872817.560:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.597271 kernel: Loading iSCSI transport class v2.0-870. Oct 31 01:06:57.619258 kernel: iscsi: registered transport (tcp) Oct 31 01:06:57.650305 kernel: iscsi: registered transport (qla4xxx) Oct 31 01:06:57.650385 kernel: QLogic iSCSI HBA Driver Oct 31 01:06:57.682415 systemd[1]: Finished dracut-cmdline.service. Oct 31 01:06:57.690487 kernel: audit: type=1130 audit(1761872817.683:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:57.690527 systemd[1]: Starting dracut-pre-udev.service... Oct 31 01:06:57.743257 kernel: raid6: avx2x4 gen() 28352 MB/s Oct 31 01:06:57.761257 kernel: raid6: avx2x4 xor() 6462 MB/s Oct 31 01:06:57.779247 kernel: raid6: avx2x2 gen() 23025 MB/s Oct 31 01:06:57.797253 kernel: raid6: avx2x2 xor() 18057 MB/s Oct 31 01:06:57.815253 kernel: raid6: avx2x1 gen() 22056 MB/s Oct 31 01:06:57.841254 kernel: raid6: avx2x1 xor() 14482 MB/s Oct 31 01:06:57.859253 kernel: raid6: sse2x4 gen() 13507 MB/s Oct 31 01:06:57.877254 kernel: raid6: sse2x4 xor() 6928 MB/s Oct 31 01:06:57.895271 kernel: raid6: sse2x2 gen() 14339 MB/s Oct 31 01:06:57.913277 kernel: raid6: sse2x2 xor() 8197 MB/s Oct 31 01:06:57.931266 kernel: raid6: sse2x1 gen() 11069 MB/s Oct 31 01:06:57.949711 kernel: raid6: sse2x1 xor() 7237 MB/s Oct 31 01:06:57.949807 kernel: raid6: using algorithm avx2x4 gen() 28352 MB/s Oct 31 01:06:57.949818 kernel: raid6: .... xor() 6462 MB/s, rmw enabled Oct 31 01:06:57.950972 kernel: raid6: using avx2x2 recovery algorithm Oct 31 01:06:57.965254 kernel: xor: automatically using best checksumming function avx Oct 31 01:06:58.067259 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 01:06:58.074272 systemd[1]: Finished dracut-pre-udev.service. Oct 31 01:06:58.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:58.076000 audit: BPF prog-id=7 op=LOAD Oct 31 01:06:58.076000 audit: BPF prog-id=8 op=LOAD Oct 31 01:06:58.077353 systemd[1]: Starting systemd-udevd.service... Oct 31 01:06:58.092283 systemd-udevd[400]: Using default interface naming scheme 'v252'. Oct 31 01:06:58.096635 systemd[1]: Started systemd-udevd.service. Oct 31 01:06:58.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:58.100018 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 01:06:58.110497 dracut-pre-trigger[411]: rd.md=0: removing MD RAID activation Oct 31 01:06:58.136981 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 01:06:58.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:58.138535 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:06:58.176317 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:06:58.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:58.253310 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Oct 31 01:06:58.275984 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 01:06:58.276027 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 31 01:06:58.276060 kernel: GPT:9289727 != 19775487 Oct 31 01:06:58.276081 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 31 01:06:58.276102 kernel: GPT:9289727 != 19775487 Oct 31 01:06:58.276124 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 31 01:06:58.276146 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:06:58.276168 kernel: libata version 3.00 loaded. Oct 31 01:06:58.279246 kernel: AVX2 version of gcm_enc/dec engaged. Oct 31 01:06:58.285093 kernel: AES CTR mode by8 optimization enabled Oct 31 01:06:58.293258 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (447) Oct 31 01:06:58.293314 kernel: ahci 0000:00:1f.2: version 3.0 Oct 31 01:06:58.327330 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 31 01:06:58.327350 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 31 01:06:58.327458 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 31 01:06:58.327536 kernel: scsi host0: ahci Oct 31 01:06:58.327634 kernel: scsi host1: ahci Oct 31 01:06:58.327734 kernel: scsi host2: ahci Oct 31 01:06:58.327846 kernel: scsi host3: ahci Oct 31 01:06:58.327932 kernel: scsi host4: ahci Oct 31 01:06:58.328011 kernel: scsi host5: ahci Oct 31 01:06:58.328096 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Oct 31 01:06:58.328106 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Oct 31 01:06:58.328115 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Oct 31 01:06:58.328124 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Oct 31 01:06:58.328135 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Oct 31 01:06:58.328143 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Oct 31 01:06:58.297183 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 01:06:58.310474 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 01:06:58.331422 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 01:06:58.333444 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 01:06:58.341167 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:06:58.343595 systemd[1]: Starting disk-uuid.service... Oct 31 01:06:58.351246 disk-uuid[525]: Primary Header is updated. Oct 31 01:06:58.351246 disk-uuid[525]: Secondary Entries is updated. Oct 31 01:06:58.351246 disk-uuid[525]: Secondary Header is updated. Oct 31 01:06:58.359106 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:06:58.359125 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:06:58.639132 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 31 01:06:58.639248 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Oct 31 01:06:58.641251 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 31 01:06:58.641277 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 31 01:06:58.643258 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 31 01:06:58.645270 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 31 01:06:58.647272 kernel: ata3.00: applying bridge limits Oct 31 01:06:58.649256 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 31 01:06:58.649293 kernel: ata3.00: configured for UDMA/100 Oct 31 01:06:58.651260 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 31 01:06:58.685862 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 31 01:06:58.703325 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 31 01:06:58.703356 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 31 01:06:59.360866 disk-uuid[526]: The operation has completed successfully. Oct 31 01:06:59.362623 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 01:06:59.392449 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 01:06:59.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.392532 systemd[1]: Finished disk-uuid.service. Oct 31 01:06:59.397499 systemd[1]: Starting verity-setup.service... Oct 31 01:06:59.420285 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Oct 31 01:06:59.444880 systemd[1]: Found device dev-mapper-usr.device. Oct 31 01:06:59.448737 systemd[1]: Mounting sysusr-usr.mount... Oct 31 01:06:59.451525 systemd[1]: Finished verity-setup.service. Oct 31 01:06:59.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.560242 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 01:06:59.560548 systemd[1]: Mounted sysusr-usr.mount. Oct 31 01:06:59.562056 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 31 01:06:59.563268 systemd[1]: Starting ignition-setup.service... Oct 31 01:06:59.567983 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 01:06:59.577169 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:06:59.577260 kernel: BTRFS info (device vda6): using free space tree Oct 31 01:06:59.577302 kernel: BTRFS info (device vda6): has skinny extents Oct 31 01:06:59.585546 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 01:06:59.634533 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 01:06:59.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.638000 audit: BPF prog-id=9 op=LOAD Oct 31 01:06:59.639294 systemd[1]: Starting systemd-networkd.service... Oct 31 01:06:59.679502 systemd-networkd[714]: lo: Link UP Oct 31 01:06:59.679511 systemd-networkd[714]: lo: Gained carrier Oct 31 01:06:59.679888 systemd-networkd[714]: Enumeration completed Oct 31 01:06:59.680075 systemd-networkd[714]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 01:06:59.742591 systemd-networkd[714]: eth0: Link UP Oct 31 01:06:59.742595 systemd-networkd[714]: eth0: Gained carrier Oct 31 01:06:59.742724 systemd[1]: Started systemd-networkd.service. Oct 31 01:06:59.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.753966 systemd[1]: Reached target network.target. Oct 31 01:06:59.758053 systemd[1]: Starting iscsiuio.service... Oct 31 01:06:59.781030 systemd[1]: Started iscsiuio.service. Oct 31 01:06:59.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.796867 systemd-networkd[714]: eth0: DHCPv4 address 10.0.0.30/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 01:06:59.802248 systemd[1]: Starting iscsid.service... Oct 31 01:06:59.805082 iscsid[719]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:06:59.805082 iscsid[719]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 01:06:59.805082 iscsid[719]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 01:06:59.805082 iscsid[719]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 01:06:59.805082 iscsid[719]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 01:06:59.805082 iscsid[719]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 01:06:59.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.819303 systemd[1]: Started iscsid.service. Oct 31 01:06:59.828898 systemd[1]: Finished ignition-setup.service. Oct 31 01:06:59.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.833685 systemd[1]: Starting dracut-initqueue.service... Oct 31 01:06:59.836964 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 01:06:59.948068 systemd[1]: Finished dracut-initqueue.service. Oct 31 01:06:59.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:06:59.948927 systemd[1]: Reached target remote-fs-pre.target. Oct 31 01:06:59.951558 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:06:59.976812 systemd[1]: Reached target remote-fs.target. Oct 31 01:06:59.980012 systemd[1]: Starting dracut-pre-mount.service... Oct 31 01:06:59.990913 systemd[1]: Finished dracut-pre-mount.service. Oct 31 01:07:00.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.070728 ignition[722]: Ignition 2.14.0 Oct 31 01:07:00.070746 ignition[722]: Stage: fetch-offline Oct 31 01:07:00.070823 ignition[722]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:07:00.070832 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:07:00.070967 ignition[722]: parsed url from cmdline: "" Oct 31 01:07:00.070970 ignition[722]: no config URL provided Oct 31 01:07:00.070975 ignition[722]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 01:07:00.070983 ignition[722]: no config at "/usr/lib/ignition/user.ign" Oct 31 01:07:00.071019 ignition[722]: op(1): [started] loading QEMU firmware config module Oct 31 01:07:00.071023 ignition[722]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 31 01:07:00.078442 ignition[722]: op(1): [finished] loading QEMU firmware config module Oct 31 01:07:00.083090 ignition[722]: parsing config with SHA512: 6c55f0761c77b006c93cf1641c2cf8fe79abbd0682721f51fe4246f6b6e06afd45d752c2b480e1f91cfee4f49dde76595d9137fdb8cea8800f262338243aa659 Oct 31 01:07:00.100959 unknown[722]: fetched base config from "system" Oct 31 01:07:00.100977 unknown[722]: fetched user config from "qemu" Oct 31 01:07:00.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.101468 ignition[722]: fetch-offline: fetch-offline passed Oct 31 01:07:00.102558 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 01:07:00.101558 ignition[722]: Ignition finished successfully Oct 31 01:07:00.104623 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 31 01:07:00.114865 ignition[742]: Ignition 2.14.0 Oct 31 01:07:00.105558 systemd[1]: Starting ignition-kargs.service... Oct 31 01:07:00.114873 ignition[742]: Stage: kargs Oct 31 01:07:00.118192 systemd[1]: Finished ignition-kargs.service. Oct 31 01:07:00.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.114986 ignition[742]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:07:00.121678 systemd[1]: Starting ignition-disks.service... Oct 31 01:07:00.114997 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:07:00.115852 ignition[742]: kargs: kargs passed Oct 31 01:07:00.115891 ignition[742]: Ignition finished successfully Oct 31 01:07:00.137379 ignition[748]: Ignition 2.14.0 Oct 31 01:07:00.137395 ignition[748]: Stage: disks Oct 31 01:07:00.137519 ignition[748]: no configs at "/usr/lib/ignition/base.d" Oct 31 01:07:00.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.139851 systemd[1]: Finished ignition-disks.service. Oct 31 01:07:00.137527 ignition[748]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:07:00.141501 systemd[1]: Reached target initrd-root-device.target. Oct 31 01:07:00.138680 ignition[748]: disks: disks passed Oct 31 01:07:00.144338 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:07:00.138730 ignition[748]: Ignition finished successfully Oct 31 01:07:00.145881 systemd[1]: Reached target local-fs.target. Oct 31 01:07:00.147326 systemd[1]: Reached target sysinit.target. Oct 31 01:07:00.148803 systemd[1]: Reached target basic.target. Oct 31 01:07:00.152560 systemd[1]: Starting systemd-fsck-root.service... Oct 31 01:07:00.167879 systemd-fsck[756]: ROOT: clean, 637/553520 files, 56032/553472 blocks Oct 31 01:07:00.173171 systemd[1]: Finished systemd-fsck-root.service. Oct 31 01:07:00.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.174844 systemd[1]: Mounting sysroot.mount... Oct 31 01:07:00.185261 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 01:07:00.185390 systemd[1]: Mounted sysroot.mount. Oct 31 01:07:00.187885 systemd[1]: Reached target initrd-root-fs.target. Oct 31 01:07:00.189792 systemd[1]: Mounting sysroot-usr.mount... Oct 31 01:07:00.193433 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 01:07:00.193479 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 01:07:00.193507 systemd[1]: Reached target ignition-diskful.target. Oct 31 01:07:00.197280 systemd[1]: Mounted sysroot-usr.mount. Oct 31 01:07:00.200611 systemd[1]: Starting initrd-setup-root.service... Oct 31 01:07:00.213939 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 01:07:00.220424 initrd-setup-root[774]: cut: /sysroot/etc/group: No such file or directory Oct 31 01:07:00.226344 initrd-setup-root[782]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 01:07:00.233168 initrd-setup-root[790]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 01:07:00.271915 systemd[1]: Finished initrd-setup-root.service. Oct 31 01:07:00.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.273690 systemd[1]: Starting ignition-mount.service... Oct 31 01:07:00.276229 systemd[1]: Starting sysroot-boot.service... Oct 31 01:07:00.282088 bash[807]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 01:07:00.293670 ignition[808]: INFO : Ignition 2.14.0 Oct 31 01:07:00.293670 ignition[808]: INFO : Stage: mount Oct 31 01:07:00.297886 ignition[808]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:07:00.297886 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:07:00.297886 ignition[808]: INFO : mount: mount passed Oct 31 01:07:00.297886 ignition[808]: INFO : Ignition finished successfully Oct 31 01:07:00.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:00.295816 systemd[1]: Finished ignition-mount.service. Oct 31 01:07:00.300807 systemd[1]: Finished sysroot-boot.service. Oct 31 01:07:00.459505 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 01:07:00.468255 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (817) Oct 31 01:07:00.472675 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 01:07:00.472737 kernel: BTRFS info (device vda6): using free space tree Oct 31 01:07:00.472773 kernel: BTRFS info (device vda6): has skinny extents Oct 31 01:07:00.480171 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 01:07:00.482889 systemd[1]: Starting ignition-files.service... Oct 31 01:07:00.496924 ignition[837]: INFO : Ignition 2.14.0 Oct 31 01:07:00.496924 ignition[837]: INFO : Stage: files Oct 31 01:07:00.499750 ignition[837]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:07:00.499750 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:07:00.503928 ignition[837]: DEBUG : files: compiled without relabeling support, skipping Oct 31 01:07:00.503928 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 01:07:00.503928 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 01:07:00.510977 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 01:07:00.510977 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 01:07:00.510977 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:07:00.510977 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Oct 31 01:07:00.505856 unknown[837]: wrote ssh authorized keys file for user: core Oct 31 01:07:00.848021 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 31 01:07:01.101916 systemd-networkd[714]: eth0: Gained IPv6LL Oct 31 01:07:01.867499 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 01:07:01.867499 ignition[837]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Oct 31 01:07:01.874687 ignition[837]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:07:01.874687 ignition[837]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 31 01:07:01.874687 ignition[837]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Oct 31 01:07:01.874687 ignition[837]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Oct 31 01:07:01.874687 ignition[837]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:07:01.918738 ignition[837]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 31 01:07:01.923091 ignition[837]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Oct 31 01:07:01.923091 ignition[837]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:07:01.923091 ignition[837]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 01:07:01.923091 ignition[837]: INFO : files: files passed Oct 31 01:07:01.923091 ignition[837]: INFO : Ignition finished successfully Oct 31 01:07:01.965793 kernel: kauditd_printk_skb: 24 callbacks suppressed Oct 31 01:07:01.965818 kernel: audit: type=1130 audit(1761872821.922:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.965829 kernel: audit: type=1130 audit(1761872821.943:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.965840 kernel: audit: type=1130 audit(1761872821.952:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.965849 kernel: audit: type=1131 audit(1761872821.952:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.920790 systemd[1]: Finished ignition-files.service. Oct 31 01:07:01.924663 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 01:07:01.934705 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 01:07:01.974534 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 31 01:07:01.935399 systemd[1]: Starting ignition-quench.service... Oct 31 01:07:01.979020 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 01:07:01.939523 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 01:07:01.997914 kernel: audit: type=1130 audit(1761872821.983:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.999206 kernel: audit: type=1131 audit(1761872821.983:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:01.944346 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 01:07:01.944518 systemd[1]: Finished ignition-quench.service. Oct 31 01:07:01.952450 systemd[1]: Reached target ignition-complete.target. Oct 31 01:07:01.966293 systemd[1]: Starting initrd-parse-etc.service... Oct 31 01:07:01.980158 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 01:07:01.980252 systemd[1]: Finished initrd-parse-etc.service. Oct 31 01:07:01.983869 systemd[1]: Reached target initrd-fs.target. Oct 31 01:07:01.997908 systemd[1]: Reached target initrd.target. Oct 31 01:07:01.999294 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 01:07:02.025713 kernel: audit: type=1130 audit(1761872822.016:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.000184 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 01:07:02.014518 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 01:07:02.017263 systemd[1]: Starting initrd-cleanup.service... Oct 31 01:07:02.032165 systemd[1]: Stopped target nss-lookup.target. Oct 31 01:07:02.033671 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 01:07:02.036424 systemd[1]: Stopped target timers.target. Oct 31 01:07:02.039159 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 01:07:02.049969 kernel: audit: type=1131 audit(1761872822.041:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.039334 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 01:07:02.041924 systemd[1]: Stopped target initrd.target. Oct 31 01:07:02.050029 systemd[1]: Stopped target basic.target. Oct 31 01:07:02.052505 systemd[1]: Stopped target ignition-complete.target. Oct 31 01:07:02.055017 systemd[1]: Stopped target ignition-diskful.target. Oct 31 01:07:02.057506 systemd[1]: Stopped target initrd-root-device.target. Oct 31 01:07:02.060271 systemd[1]: Stopped target remote-fs.target. Oct 31 01:07:02.062844 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 01:07:02.065524 systemd[1]: Stopped target sysinit.target. Oct 31 01:07:02.067943 systemd[1]: Stopped target local-fs.target. Oct 31 01:07:02.070470 systemd[1]: Stopped target local-fs-pre.target. Oct 31 01:07:02.073092 systemd[1]: Stopped target swap.target. Oct 31 01:07:02.085657 kernel: audit: type=1131 audit(1761872822.077:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.075381 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 01:07:02.075500 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 01:07:02.096005 kernel: audit: type=1131 audit(1761872822.088:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.078193 systemd[1]: Stopped target cryptsetup.target. Oct 31 01:07:02.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.085700 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 01:07:02.085805 systemd[1]: Stopped dracut-initqueue.service. Oct 31 01:07:02.088613 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 01:07:02.088699 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 01:07:02.096117 systemd[1]: Stopped target paths.target. Oct 31 01:07:02.098461 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 01:07:02.102259 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 01:07:02.104391 systemd[1]: Stopped target slices.target. Oct 31 01:07:02.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.106885 systemd[1]: Stopped target sockets.target. Oct 31 01:07:02.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.109198 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 01:07:02.109273 systemd[1]: Closed iscsid.socket. Oct 31 01:07:02.111969 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 01:07:02.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.112051 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 01:07:02.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.132865 ignition[877]: INFO : Ignition 2.14.0 Oct 31 01:07:02.132865 ignition[877]: INFO : Stage: umount Oct 31 01:07:02.132865 ignition[877]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 31 01:07:02.132865 ignition[877]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 31 01:07:02.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.114958 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 01:07:02.147404 ignition[877]: INFO : umount: umount passed Oct 31 01:07:02.147404 ignition[877]: INFO : Ignition finished successfully Oct 31 01:07:02.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.115036 systemd[1]: Stopped ignition-files.service. Oct 31 01:07:02.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.118359 systemd[1]: Stopping ignition-mount.service... Oct 31 01:07:02.119891 systemd[1]: Stopping iscsiuio.service... Oct 31 01:07:02.123909 systemd[1]: Stopping sysroot-boot.service... Oct 31 01:07:02.125258 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 01:07:02.125424 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 01:07:02.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.127152 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 01:07:02.127300 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 01:07:02.135053 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 01:07:02.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.135198 systemd[1]: Stopped iscsiuio.service. Oct 31 01:07:02.137944 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 01:07:02.138014 systemd[1]: Stopped ignition-mount.service. Oct 31 01:07:02.142988 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 01:07:02.144381 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 01:07:02.189000 audit: BPF prog-id=6 op=UNLOAD Oct 31 01:07:02.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.144454 systemd[1]: Finished initrd-cleanup.service. Oct 31 01:07:02.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.148322 systemd[1]: Stopped target network.target. Oct 31 01:07:02.150272 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 01:07:02.150312 systemd[1]: Closed iscsiuio.socket. Oct 31 01:07:02.153171 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 01:07:02.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.153237 systemd[1]: Stopped ignition-disks.service. Oct 31 01:07:02.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.154943 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 01:07:02.154990 systemd[1]: Stopped ignition-kargs.service. Oct 31 01:07:02.156605 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 01:07:02.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.156642 systemd[1]: Stopped ignition-setup.service. Oct 31 01:07:02.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.159727 systemd[1]: Stopping systemd-networkd.service... Oct 31 01:07:02.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.162655 systemd[1]: Stopping systemd-resolved.service... Oct 31 01:07:02.166398 systemd-networkd[714]: eth0: DHCPv6 lease lost Oct 31 01:07:02.236000 audit: BPF prog-id=9 op=UNLOAD Oct 31 01:07:02.169136 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 01:07:02.169316 systemd[1]: Stopped systemd-networkd.service. Oct 31 01:07:02.176334 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 01:07:02.176414 systemd[1]: Stopped systemd-resolved.service. Oct 31 01:07:02.183620 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 01:07:02.183657 systemd[1]: Closed systemd-networkd.socket. Oct 31 01:07:02.187141 systemd[1]: Stopping network-cleanup.service... Oct 31 01:07:02.188912 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 01:07:02.188978 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 01:07:02.192397 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 01:07:02.192444 systemd[1]: Stopped systemd-sysctl.service. Oct 31 01:07:02.195073 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 01:07:02.195143 systemd[1]: Stopped systemd-modules-load.service. Oct 31 01:07:02.196766 systemd[1]: Stopping systemd-udevd.service... Oct 31 01:07:02.199529 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 01:07:02.292834 systemd-journald[198]: Received SIGTERM from PID 1 (n/a). Oct 31 01:07:02.292869 iscsid[719]: iscsid shutting down. Oct 31 01:07:02.203425 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 01:07:02.203600 systemd[1]: Stopped network-cleanup.service. Oct 31 01:07:02.206826 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 01:07:02.207011 systemd[1]: Stopped systemd-udevd.service. Oct 31 01:07:02.211425 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 01:07:02.211501 systemd[1]: Stopped sysroot-boot.service. Oct 31 01:07:02.213757 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 01:07:02.213787 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 01:07:02.216455 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 01:07:02.216482 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 01:07:02.217080 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 01:07:02.217113 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 01:07:02.217652 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 01:07:02.217678 systemd[1]: Stopped dracut-cmdline.service. Oct 31 01:07:02.217917 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 01:07:02.217943 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 01:07:02.218194 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 01:07:02.218229 systemd[1]: Stopped initrd-setup-root.service. Oct 31 01:07:02.219132 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 01:07:02.219591 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 31 01:07:02.219630 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 31 01:07:02.225142 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 01:07:02.225174 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 01:07:02.227671 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 01:07:02.227704 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 01:07:02.229883 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 31 01:07:02.230200 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 01:07:02.230313 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 01:07:02.232117 systemd[1]: Reached target initrd-switch-root.target. Oct 31 01:07:02.234094 systemd[1]: Starting initrd-switch-root.service... Oct 31 01:07:02.250169 systemd[1]: Switching root. Oct 31 01:07:02.293935 systemd-journald[198]: Journal stopped Oct 31 01:07:08.544139 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 01:07:08.544265 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 01:07:08.544304 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 01:07:08.544341 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 01:07:08.544368 kernel: SELinux: policy capability open_perms=1 Oct 31 01:07:08.544405 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 01:07:08.544474 kernel: SELinux: policy capability always_check_network=0 Oct 31 01:07:08.544516 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 01:07:08.544556 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 01:07:08.544574 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 01:07:08.544598 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 01:07:08.544639 systemd[1]: Successfully loaded SELinux policy in 73.752ms. Oct 31 01:07:08.544686 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.297ms. Oct 31 01:07:08.544717 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 01:07:08.544746 systemd[1]: Detected virtualization kvm. Oct 31 01:07:08.544773 systemd[1]: Detected architecture x86-64. Oct 31 01:07:08.544802 systemd[1]: Detected first boot. Oct 31 01:07:08.544826 systemd[1]: Initializing machine ID from VM UUID. Oct 31 01:07:08.544843 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 01:07:08.544880 systemd[1]: Populated /etc with preset unit settings. Oct 31 01:07:08.544907 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:07:08.544957 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:07:08.544988 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:07:08.545016 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 31 01:07:08.545038 kernel: audit: type=1334 audit(1761872828.207:85): prog-id=12 op=LOAD Oct 31 01:07:08.545052 kernel: audit: type=1334 audit(1761872828.207:86): prog-id=3 op=UNLOAD Oct 31 01:07:08.545065 kernel: audit: type=1334 audit(1761872828.212:87): prog-id=13 op=LOAD Oct 31 01:07:08.545097 kernel: audit: type=1334 audit(1761872828.216:88): prog-id=14 op=LOAD Oct 31 01:07:08.545123 kernel: audit: type=1334 audit(1761872828.216:89): prog-id=4 op=UNLOAD Oct 31 01:07:08.545138 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 01:07:08.545152 kernel: audit: type=1334 audit(1761872828.216:90): prog-id=5 op=UNLOAD Oct 31 01:07:08.545165 systemd[1]: Stopped iscsid.service. Oct 31 01:07:08.545181 kernel: audit: type=1131 audit(1761872828.218:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.545197 kernel: audit: type=1131 audit(1761872828.233:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.545235 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 01:07:08.545259 systemd[1]: Stopped initrd-switch-root.service. Oct 31 01:07:08.545273 kernel: audit: type=1130 audit(1761872828.244:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.545284 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 01:07:08.545296 kernel: audit: type=1131 audit(1761872828.244:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.545308 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 01:07:08.545319 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 01:07:08.545331 systemd[1]: Created slice system-getty.slice. Oct 31 01:07:08.545726 systemd[1]: Created slice system-modprobe.slice. Oct 31 01:07:08.545739 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 01:07:08.545752 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 01:07:08.545764 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 01:07:08.545775 systemd[1]: Created slice user.slice. Oct 31 01:07:08.545787 systemd[1]: Started systemd-ask-password-console.path. Oct 31 01:07:08.545798 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 01:07:08.545810 systemd[1]: Set up automount boot.automount. Oct 31 01:07:08.545822 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 01:07:08.545839 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 01:07:08.545852 systemd[1]: Stopped target initrd-fs.target. Oct 31 01:07:08.545866 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 01:07:08.545880 systemd[1]: Reached target integritysetup.target. Oct 31 01:07:08.545899 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 01:07:08.545921 systemd[1]: Reached target remote-fs.target. Oct 31 01:07:08.545936 systemd[1]: Reached target slices.target. Oct 31 01:07:08.545949 systemd[1]: Reached target swap.target. Oct 31 01:07:08.545967 systemd[1]: Reached target torcx.target. Oct 31 01:07:08.545981 systemd[1]: Reached target veritysetup.target. Oct 31 01:07:08.545998 systemd[1]: Listening on systemd-coredump.socket. Oct 31 01:07:08.546012 systemd[1]: Listening on systemd-initctl.socket. Oct 31 01:07:08.546035 systemd[1]: Listening on systemd-networkd.socket. Oct 31 01:07:08.546049 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 01:07:08.546062 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 01:07:08.546083 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 01:07:08.546097 systemd[1]: Mounting dev-hugepages.mount... Oct 31 01:07:08.546111 systemd[1]: Mounting dev-mqueue.mount... Oct 31 01:07:08.546125 systemd[1]: Mounting media.mount... Oct 31 01:07:08.546140 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:07:08.546154 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 01:07:08.546168 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 01:07:08.546182 systemd[1]: Mounting tmp.mount... Oct 31 01:07:08.546196 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 01:07:08.546228 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:07:08.546243 systemd[1]: Starting kmod-static-nodes.service... Oct 31 01:07:08.546258 systemd[1]: Starting modprobe@configfs.service... Oct 31 01:07:08.546271 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:07:08.546285 systemd[1]: Starting modprobe@drm.service... Oct 31 01:07:08.546299 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:07:08.546313 systemd[1]: Starting modprobe@fuse.service... Oct 31 01:07:08.546327 systemd[1]: Starting modprobe@loop.service... Oct 31 01:07:08.546342 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 01:07:08.546371 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 01:07:08.546395 kernel: fuse: init (API version 7.34) Oct 31 01:07:08.546409 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 01:07:08.546423 kernel: loop: module loaded Oct 31 01:07:08.546436 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 01:07:08.546450 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 01:07:08.546464 systemd[1]: Stopped systemd-journald.service. Oct 31 01:07:08.546482 systemd[1]: Starting systemd-journald.service... Oct 31 01:07:08.546496 systemd[1]: Starting systemd-modules-load.service... Oct 31 01:07:08.546515 systemd[1]: Starting systemd-network-generator.service... Oct 31 01:07:08.546529 systemd[1]: Starting systemd-remount-fs.service... Oct 31 01:07:08.546542 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 01:07:08.546556 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 01:07:08.546570 systemd[1]: Stopped verity-setup.service. Oct 31 01:07:08.546587 systemd-journald[999]: Journal started Oct 31 01:07:08.546644 systemd-journald[999]: Runtime Journal (/run/log/journal/eeaec3f75978499fb30f5c3112c7e6af) is 6.0M, max 48.4M, 42.4M free. Oct 31 01:07:02.381000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 01:07:02.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:07:02.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 01:07:02.734000 audit: BPF prog-id=10 op=LOAD Oct 31 01:07:02.735000 audit: BPF prog-id=10 op=UNLOAD Oct 31 01:07:02.735000 audit: BPF prog-id=11 op=LOAD Oct 31 01:07:02.735000 audit: BPF prog-id=11 op=UNLOAD Oct 31 01:07:02.769000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 01:07:02.769000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:02.769000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:07:02.771000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 01:07:02.771000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:02.771000 audit: CWD cwd="/" Oct 31 01:07:02.771000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:02.771000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:02.771000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 01:07:08.207000 audit: BPF prog-id=12 op=LOAD Oct 31 01:07:08.207000 audit: BPF prog-id=3 op=UNLOAD Oct 31 01:07:08.212000 audit: BPF prog-id=13 op=LOAD Oct 31 01:07:08.216000 audit: BPF prog-id=14 op=LOAD Oct 31 01:07:08.216000 audit: BPF prog-id=4 op=UNLOAD Oct 31 01:07:08.216000 audit: BPF prog-id=5 op=UNLOAD Oct 31 01:07:08.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.253000 audit: BPF prog-id=12 op=UNLOAD Oct 31 01:07:08.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.519000 audit: BPF prog-id=15 op=LOAD Oct 31 01:07:08.519000 audit: BPF prog-id=16 op=LOAD Oct 31 01:07:08.519000 audit: BPF prog-id=17 op=LOAD Oct 31 01:07:08.519000 audit: BPF prog-id=13 op=UNLOAD Oct 31 01:07:08.519000 audit: BPF prog-id=14 op=UNLOAD Oct 31 01:07:08.540000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 01:07:08.540000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd39c96000 a2=4000 a3=7ffd39c9609c items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:08.540000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 01:07:08.205036 systemd[1]: Queued start job for default target multi-user.target. Oct 31 01:07:02.767394 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:07:08.205051 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 31 01:07:02.767700 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:07:08.218096 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 01:07:02.767716 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:07:02.767744 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 01:07:02.767754 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 01:07:08.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:02.767784 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 01:07:02.767795 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 01:07:02.767991 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 01:07:02.768023 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 01:07:02.768034 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 01:07:02.768885 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 01:07:02.768921 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 01:07:02.768938 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 01:07:02.768951 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 01:07:02.768965 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 01:07:02.768977 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 01:07:07.845919 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:07Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:07:07.846381 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:07Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:07:07.846587 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:07Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:07:07.846811 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:07Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 01:07:07.846867 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:07Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 01:07:07.846944 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-10-31T01:07:07Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 01:07:08.552266 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:07:08.555957 systemd[1]: Started systemd-journald.service. Oct 31 01:07:08.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.556627 systemd[1]: Mounted dev-hugepages.mount. Oct 31 01:07:08.558023 systemd[1]: Mounted dev-mqueue.mount. Oct 31 01:07:08.559425 systemd[1]: Mounted media.mount. Oct 31 01:07:08.561002 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 01:07:08.562867 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 01:07:08.564534 systemd[1]: Mounted tmp.mount. Oct 31 01:07:08.565950 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 01:07:08.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.567645 systemd[1]: Finished kmod-static-nodes.service. Oct 31 01:07:08.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.569538 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 01:07:08.569684 systemd[1]: Finished modprobe@configfs.service. Oct 31 01:07:08.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.571418 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:07:08.571547 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:07:08.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.573292 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:07:08.573418 systemd[1]: Finished modprobe@drm.service. Oct 31 01:07:08.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.574983 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:07:08.575102 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:07:08.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.576795 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 01:07:08.576911 systemd[1]: Finished modprobe@fuse.service. Oct 31 01:07:08.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.579058 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:07:08.579174 systemd[1]: Finished modprobe@loop.service. Oct 31 01:07:08.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.580755 systemd[1]: Finished systemd-modules-load.service. Oct 31 01:07:08.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.582532 systemd[1]: Finished systemd-network-generator.service. Oct 31 01:07:08.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.584698 systemd[1]: Finished systemd-remount-fs.service. Oct 31 01:07:08.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.587257 systemd[1]: Reached target network-pre.target. Oct 31 01:07:08.590557 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 01:07:08.593437 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 01:07:08.595022 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 01:07:08.596614 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 01:07:08.599356 systemd[1]: Starting systemd-journal-flush.service... Oct 31 01:07:08.601151 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:07:08.604043 systemd-journald[999]: Time spent on flushing to /var/log/journal/eeaec3f75978499fb30f5c3112c7e6af is 19.566ms for 1149 entries. Oct 31 01:07:08.604043 systemd-journald[999]: System Journal (/var/log/journal/eeaec3f75978499fb30f5c3112c7e6af) is 8.0M, max 195.6M, 187.6M free. Oct 31 01:07:08.709582 systemd-journald[999]: Received client request to flush runtime journal. Oct 31 01:07:08.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.602460 systemd[1]: Starting systemd-random-seed.service... Oct 31 01:07:08.606318 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:07:08.607505 systemd[1]: Starting systemd-sysctl.service... Oct 31 01:07:08.610093 systemd[1]: Starting systemd-sysusers.service... Oct 31 01:07:08.712709 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 31 01:07:08.614640 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 01:07:08.616417 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 01:07:08.618045 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 01:07:08.621095 systemd[1]: Starting systemd-udev-settle.service... Oct 31 01:07:08.623244 systemd[1]: Finished systemd-random-seed.service. Oct 31 01:07:08.624889 systemd[1]: Reached target first-boot-complete.target. Oct 31 01:07:08.710967 systemd[1]: Finished systemd-journal-flush.service. Oct 31 01:07:08.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.716755 systemd[1]: Finished systemd-sysctl.service. Oct 31 01:07:08.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.721641 systemd[1]: Finished systemd-sysusers.service. Oct 31 01:07:08.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:08.724960 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 01:07:08.747690 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 01:07:08.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:09.698794 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 01:07:09.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:09.702000 audit: BPF prog-id=18 op=LOAD Oct 31 01:07:09.702000 audit: BPF prog-id=19 op=LOAD Oct 31 01:07:09.702000 audit: BPF prog-id=7 op=UNLOAD Oct 31 01:07:09.702000 audit: BPF prog-id=8 op=UNLOAD Oct 31 01:07:09.704017 systemd[1]: Starting systemd-udevd.service... Oct 31 01:07:09.730391 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Oct 31 01:07:09.748960 systemd[1]: Started systemd-udevd.service. Oct 31 01:07:09.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:09.751000 audit: BPF prog-id=20 op=LOAD Oct 31 01:07:09.752378 systemd[1]: Starting systemd-networkd.service... Oct 31 01:07:09.757000 audit: BPF prog-id=21 op=LOAD Oct 31 01:07:09.757000 audit: BPF prog-id=22 op=LOAD Oct 31 01:07:09.757000 audit: BPF prog-id=23 op=LOAD Oct 31 01:07:09.758984 systemd[1]: Starting systemd-userdbd.service... Oct 31 01:07:09.789766 systemd[1]: Started systemd-userdbd.service. Oct 31 01:07:09.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:09.792431 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 01:07:09.796396 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 01:07:09.829260 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 31 01:07:09.835250 kernel: ACPI: button: Power Button [PWRF] Oct 31 01:07:09.846590 systemd-networkd[1027]: lo: Link UP Oct 31 01:07:09.846600 systemd-networkd[1027]: lo: Gained carrier Oct 31 01:07:09.847060 systemd-networkd[1027]: Enumeration completed Oct 31 01:07:09.847161 systemd[1]: Started systemd-networkd.service. Oct 31 01:07:09.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:09.848830 systemd-networkd[1027]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 01:07:09.850242 systemd-networkd[1027]: eth0: Link UP Oct 31 01:07:09.850249 systemd-networkd[1027]: eth0: Gained carrier Oct 31 01:07:09.848000 audit[1030]: AVC avc: denied { confidentiality } for pid=1030 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 01:07:09.848000 audit[1030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b1c3bc8200 a1=338ec a2=7f01d0c00bc5 a3=5 items=110 ppid=1018 pid=1030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:09.848000 audit: CWD cwd="/" Oct 31 01:07:09.848000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=1 name=(null) inode=15826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=2 name=(null) inode=15826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=3 name=(null) inode=15827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=4 name=(null) inode=15826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=5 name=(null) inode=15828 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=6 name=(null) inode=15826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=7 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=8 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=9 name=(null) inode=15830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=10 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=11 name=(null) inode=15831 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=12 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=13 name=(null) inode=15832 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=14 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=15 name=(null) inode=15833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=16 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=17 name=(null) inode=15834 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=18 name=(null) inode=15826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=19 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=20 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=21 name=(null) inode=15836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=22 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=23 name=(null) inode=15837 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=24 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=25 name=(null) inode=15838 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=26 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=27 name=(null) inode=15839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=28 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=29 name=(null) inode=15840 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=30 name=(null) inode=15826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=31 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=32 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=33 name=(null) inode=15842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=34 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=35 name=(null) inode=15843 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=36 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=37 name=(null) inode=15844 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=38 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=39 name=(null) inode=15845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=40 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=41 name=(null) inode=15846 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=42 name=(null) inode=15826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=43 name=(null) inode=15847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=44 name=(null) inode=15847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=45 name=(null) inode=15848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=46 name=(null) inode=15847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=47 name=(null) inode=15849 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=48 name=(null) inode=15847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=49 name=(null) inode=15850 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=50 name=(null) inode=15847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=51 name=(null) inode=15851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=52 name=(null) inode=15847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=53 name=(null) inode=15852 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=55 name=(null) inode=15853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=56 name=(null) inode=15853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=57 name=(null) inode=15854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=58 name=(null) inode=15853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=59 name=(null) inode=15855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=60 name=(null) inode=15853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=61 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=62 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=63 name=(null) inode=15857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=64 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=65 name=(null) inode=15858 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=66 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=67 name=(null) inode=15859 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=68 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=69 name=(null) inode=15860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=70 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=71 name=(null) inode=15861 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=72 name=(null) inode=15853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=73 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=74 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=75 name=(null) inode=15863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=76 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=77 name=(null) inode=15864 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=78 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=79 name=(null) inode=15865 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=80 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=81 name=(null) inode=15866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=82 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=83 name=(null) inode=15867 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=84 name=(null) inode=15853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=85 name=(null) inode=15868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=86 name=(null) inode=15868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=87 name=(null) inode=15869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=88 name=(null) inode=15868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=89 name=(null) inode=15870 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=90 name=(null) inode=15868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=91 name=(null) inode=15871 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=92 name=(null) inode=15868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=93 name=(null) inode=15872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=94 name=(null) inode=15868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=95 name=(null) inode=15873 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=96 name=(null) inode=15853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=97 name=(null) inode=15874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=98 name=(null) inode=15874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=99 name=(null) inode=15875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=100 name=(null) inode=15874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=101 name=(null) inode=15876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=102 name=(null) inode=15874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=103 name=(null) inode=15877 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=104 name=(null) inode=15874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=105 name=(null) inode=15878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=106 name=(null) inode=15874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=107 name=(null) inode=15879 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PATH item=109 name=(null) inode=10730 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:09.848000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 01:07:09.868439 systemd-networkd[1027]: eth0: DHCPv4 address 10.0.0.30/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 31 01:07:09.885244 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Oct 31 01:07:09.889267 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 01:07:09.899255 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Oct 31 01:07:09.907076 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 31 01:07:09.907261 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 31 01:07:09.907432 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 31 01:07:09.947263 kernel: kvm: Nested Virtualization enabled Oct 31 01:07:09.947394 kernel: SVM: kvm: Nested Paging enabled Oct 31 01:07:09.947437 kernel: SVM: Virtual VMLOAD VMSAVE supported Oct 31 01:07:09.948503 kernel: SVM: Virtual GIF supported Oct 31 01:07:09.967246 kernel: EDAC MC: Ver: 3.0.0 Oct 31 01:07:09.993760 systemd[1]: Finished systemd-udev-settle.service. Oct 31 01:07:09.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:09.996508 systemd[1]: Starting lvm2-activation-early.service... Oct 31 01:07:10.008796 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:07:10.100697 systemd[1]: Finished lvm2-activation-early.service. Oct 31 01:07:10.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.102395 systemd[1]: Reached target cryptsetup.target. Oct 31 01:07:10.105073 systemd[1]: Starting lvm2-activation.service... Oct 31 01:07:10.108643 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 01:07:10.136557 systemd[1]: Finished lvm2-activation.service. Oct 31 01:07:10.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.138133 systemd[1]: Reached target local-fs-pre.target. Oct 31 01:07:10.139529 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 01:07:10.139555 systemd[1]: Reached target local-fs.target. Oct 31 01:07:10.140801 systemd[1]: Reached target machines.target. Oct 31 01:07:10.143205 systemd[1]: Starting ldconfig.service... Oct 31 01:07:10.144694 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:07:10.144741 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:07:10.145685 systemd[1]: Starting systemd-boot-update.service... Oct 31 01:07:10.148118 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 01:07:10.150845 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 01:07:10.153649 systemd[1]: Starting systemd-sysext.service... Oct 31 01:07:10.157651 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Oct 31 01:07:10.159187 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 01:07:10.161773 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 01:07:10.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.168528 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 01:07:10.173537 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 01:07:10.173940 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 01:07:10.184242 kernel: loop0: detected capacity change from 0 to 224512 Oct 31 01:07:10.207012 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Oct 31 01:07:10.207012 systemd-fsck[1066]: /dev/vda1: 791 files, 120792/258078 clusters Oct 31 01:07:10.208881 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 01:07:10.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.213355 systemd[1]: Mounting boot.mount... Oct 31 01:07:10.625610 systemd[1]: Mounted boot.mount. Oct 31 01:07:10.637252 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 01:07:10.639918 systemd[1]: Finished systemd-boot-update.service. Oct 31 01:07:10.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.661252 kernel: loop1: detected capacity change from 0 to 224512 Oct 31 01:07:10.725920 (sd-sysext)[1071]: Using extensions 'kubernetes'. Oct 31 01:07:10.726414 (sd-sysext)[1071]: Merged extensions into '/usr'. Oct 31 01:07:10.746301 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:07:10.748064 systemd[1]: Mounting usr-share-oem.mount... Oct 31 01:07:10.749615 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:07:10.751099 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:07:10.754209 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:07:10.757206 systemd[1]: Starting modprobe@loop.service... Oct 31 01:07:10.766177 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:07:10.766412 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:07:10.766557 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:07:10.769634 systemd[1]: Mounted usr-share-oem.mount. Oct 31 01:07:10.771401 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:07:10.771569 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:07:10.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.773507 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:07:10.773609 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:07:10.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.775532 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:07:10.775631 systemd[1]: Finished modprobe@loop.service. Oct 31 01:07:10.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.777450 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:07:10.777545 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:07:10.778498 systemd[1]: Finished systemd-sysext.service. Oct 31 01:07:10.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:10.781145 systemd[1]: Starting ensure-sysext.service... Oct 31 01:07:10.783480 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 01:07:10.838759 systemd[1]: Reloading. Oct 31 01:07:10.847429 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 01:07:10.848289 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 01:07:10.849984 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 01:07:10.901212 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-10-31T01:07:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:07:10.901258 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-10-31T01:07:10Z" level=info msg="torcx already run" Oct 31 01:07:10.904551 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 01:07:10.976980 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:07:10.976999 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:07:10.997392 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:07:11.051313 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 01:07:11.053000 audit: BPF prog-id=24 op=LOAD Oct 31 01:07:11.053000 audit: BPF prog-id=25 op=LOAD Oct 31 01:07:11.053000 audit: BPF prog-id=18 op=UNLOAD Oct 31 01:07:11.053000 audit: BPF prog-id=19 op=UNLOAD Oct 31 01:07:11.056000 audit: BPF prog-id=26 op=LOAD Oct 31 01:07:11.056000 audit: BPF prog-id=20 op=UNLOAD Oct 31 01:07:11.057000 audit: BPF prog-id=27 op=LOAD Oct 31 01:07:11.057000 audit: BPF prog-id=15 op=UNLOAD Oct 31 01:07:11.057000 audit: BPF prog-id=28 op=LOAD Oct 31 01:07:11.057000 audit: BPF prog-id=29 op=LOAD Oct 31 01:07:11.057000 audit: BPF prog-id=16 op=UNLOAD Oct 31 01:07:11.057000 audit: BPF prog-id=17 op=UNLOAD Oct 31 01:07:11.058000 audit: BPF prog-id=30 op=LOAD Oct 31 01:07:11.058000 audit: BPF prog-id=21 op=UNLOAD Oct 31 01:07:11.058000 audit: BPF prog-id=31 op=LOAD Oct 31 01:07:11.058000 audit: BPF prog-id=32 op=LOAD Oct 31 01:07:11.058000 audit: BPF prog-id=22 op=UNLOAD Oct 31 01:07:11.058000 audit: BPF prog-id=23 op=UNLOAD Oct 31 01:07:11.060702 systemd[1]: Finished ldconfig.service. Oct 31 01:07:11.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.062406 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 01:07:11.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.065076 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 01:07:11.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.069942 systemd[1]: Starting audit-rules.service... Oct 31 01:07:11.072087 systemd[1]: Starting clean-ca-certificates.service... Oct 31 01:07:11.077000 audit: BPF prog-id=33 op=LOAD Oct 31 01:07:11.075031 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 01:07:11.078419 systemd[1]: Starting systemd-resolved.service... Oct 31 01:07:11.080000 audit: BPF prog-id=34 op=LOAD Oct 31 01:07:11.082958 systemd[1]: Starting systemd-timesyncd.service... Oct 31 01:07:11.087178 systemd[1]: Starting systemd-update-utmp.service... Oct 31 01:07:11.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.091000 audit[1149]: SYSTEM_BOOT pid=1149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.089333 systemd[1]: Finished clean-ca-certificates.service. Oct 31 01:07:11.097932 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:07:11.099325 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:07:11.102363 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:07:11.104608 systemd[1]: Starting modprobe@loop.service... Oct 31 01:07:11.105799 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:07:11.105899 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:07:11.106040 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:07:11.107110 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 01:07:11.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.109310 systemd[1]: Finished systemd-update-utmp.service. Oct 31 01:07:11.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.111805 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:07:11.112114 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:07:11.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.114128 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:07:11.114291 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:07:11.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.116294 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:07:11.116462 systemd[1]: Finished modprobe@loop.service. Oct 31 01:07:11.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:11.120000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 01:07:11.120000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce17f13c0 a2=420 a3=0 items=0 ppid=1139 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:11.120000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 01:07:11.120477 augenrules[1162]: No rules Oct 31 01:07:11.120836 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:07:11.122248 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:07:11.124795 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:07:11.127769 systemd[1]: Starting modprobe@loop.service... Oct 31 01:07:11.129264 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:07:11.129539 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:07:11.131022 systemd[1]: Starting systemd-update-done.service... Oct 31 01:07:11.132502 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:07:11.133428 systemd[1]: Finished audit-rules.service. Oct 31 01:07:11.135267 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:07:11.135417 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:07:11.137344 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:07:11.137621 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:07:11.156440 systemd-networkd[1027]: eth0: Gained IPv6LL Oct 31 01:07:11.156752 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:07:11.156885 systemd[1]: Finished modprobe@loop.service. Oct 31 01:07:11.158687 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:07:11.158807 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:07:11.161637 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 01:07:11.163465 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 01:07:11.166501 systemd[1]: Starting modprobe@drm.service... Oct 31 01:07:11.168900 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 01:07:11.171289 systemd[1]: Starting modprobe@loop.service... Oct 31 01:07:11.172693 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 01:07:11.172838 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:07:11.174333 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 01:07:11.174792 systemd-resolved[1142]: Positive Trust Anchors: Oct 31 01:07:11.174801 systemd-resolved[1142]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 01:07:11.174835 systemd-resolved[1142]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 01:07:11.176608 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 01:07:11.179781 systemd[1]: Started systemd-timesyncd.service. Oct 31 01:07:12.297475 systemd-timesyncd[1144]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 31 01:07:12.297851 systemd-timesyncd[1144]: Initial clock synchronization to Fri 2025-10-31 01:07:12.297387 UTC. Oct 31 01:07:12.315488 systemd[1]: Finished systemd-update-done.service. Oct 31 01:07:12.318018 systemd-resolved[1142]: Defaulting to hostname 'linux'. Oct 31 01:07:12.319177 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 01:07:12.319322 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 01:07:12.321297 systemd[1]: Started systemd-resolved.service. Oct 31 01:07:12.323166 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 01:07:12.323312 systemd[1]: Finished modprobe@drm.service. Oct 31 01:07:12.325189 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 01:07:12.325324 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 01:07:12.327276 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 01:07:12.327400 systemd[1]: Finished modprobe@loop.service. Oct 31 01:07:12.332514 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 01:07:12.334701 systemd[1]: Reached target network.target. Oct 31 01:07:12.336165 systemd[1]: Reached target network-online.target. Oct 31 01:07:12.337611 systemd[1]: Reached target nss-lookup.target. Oct 31 01:07:12.339089 systemd[1]: Reached target time-set.target. Oct 31 01:07:12.340546 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:07:12.340595 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 01:07:12.340627 systemd[1]: Reached target sysinit.target. Oct 31 01:07:12.342537 systemd[1]: Started motdgen.path. Oct 31 01:07:12.344051 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 01:07:12.347868 systemd[1]: Started logrotate.timer. Oct 31 01:07:12.349439 systemd[1]: Started mdadm.timer. Oct 31 01:07:12.350771 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 01:07:12.352318 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 01:07:12.352352 systemd[1]: Reached target paths.target. Oct 31 01:07:12.353721 systemd[1]: Reached target timers.target. Oct 31 01:07:12.355476 systemd[1]: Listening on dbus.socket. Oct 31 01:07:12.358158 systemd[1]: Starting docker.socket... Oct 31 01:07:12.361870 systemd[1]: Listening on sshd.socket. Oct 31 01:07:12.363411 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:07:12.363465 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 01:07:12.363493 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 01:07:12.364125 systemd[1]: Finished ensure-sysext.service. Oct 31 01:07:12.365740 systemd[1]: Listening on docker.socket. Oct 31 01:07:12.368209 systemd[1]: Reached target sockets.target. Oct 31 01:07:12.369861 systemd[1]: Reached target basic.target. Oct 31 01:07:12.371427 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:07:12.371458 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 01:07:12.372795 systemd[1]: Starting containerd.service... Oct 31 01:07:12.375433 systemd[1]: Starting dbus.service... Oct 31 01:07:12.377673 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 01:07:12.380548 systemd[1]: Starting extend-filesystems.service... Oct 31 01:07:12.382495 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 01:07:12.384601 systemd[1]: Starting kubelet.service... Oct 31 01:07:12.387669 jq[1181]: false Oct 31 01:07:12.388114 systemd[1]: Starting motdgen.service... Oct 31 01:07:12.391145 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 01:07:12.394400 extend-filesystems[1182]: Found loop1 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found sr0 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda1 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda2 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda3 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found usr Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda4 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda6 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda7 Oct 31 01:07:12.400966 extend-filesystems[1182]: Found vda9 Oct 31 01:07:12.400966 extend-filesystems[1182]: Checking size of /dev/vda9 Oct 31 01:07:12.397568 systemd[1]: Starting sshd-keygen.service... Oct 31 01:07:12.429454 dbus-daemon[1180]: [system] SELinux support is enabled Oct 31 01:07:12.443543 extend-filesystems[1182]: Resized partition /dev/vda9 Oct 31 01:07:12.407531 systemd[1]: Starting systemd-logind.service... Oct 31 01:07:12.467809 extend-filesystems[1207]: resize2fs 1.46.5 (30-Dec-2021) Oct 31 01:07:12.415839 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 01:07:12.477145 jq[1203]: true Oct 31 01:07:12.415936 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 01:07:12.416558 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 01:07:12.418436 systemd[1]: Starting update-engine.service... Oct 31 01:07:12.427944 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 01:07:12.477939 jq[1208]: true Oct 31 01:07:12.430318 systemd[1]: Started dbus.service. Oct 31 01:07:12.438451 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 01:07:12.438632 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 01:07:12.440416 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 01:07:12.440662 systemd[1]: Finished motdgen.service. Oct 31 01:07:12.441811 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 01:07:12.441977 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 01:07:12.449994 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 01:07:12.450025 systemd[1]: Reached target system-config.target. Oct 31 01:07:12.451675 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 01:07:12.451693 systemd[1]: Reached target user-config.target. Oct 31 01:07:12.498906 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Oct 31 01:07:12.530266 env[1209]: time="2025-10-31T01:07:12.530104147Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 01:07:12.552784 env[1209]: time="2025-10-31T01:07:12.552705152Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 01:07:12.553044 env[1209]: time="2025-10-31T01:07:12.553005044Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:07:12.555472 env[1209]: time="2025-10-31T01:07:12.555411037Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:07:12.555472 env[1209]: time="2025-10-31T01:07:12.555460089Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:07:12.555831 env[1209]: time="2025-10-31T01:07:12.555782223Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:07:12.555918 env[1209]: time="2025-10-31T01:07:12.555849629Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 01:07:12.555918 env[1209]: time="2025-10-31T01:07:12.555875427Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 01:07:12.555918 env[1209]: time="2025-10-31T01:07:12.555895796Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 01:07:12.556011 env[1209]: time="2025-10-31T01:07:12.555986065Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:07:12.556297 env[1209]: time="2025-10-31T01:07:12.556264237Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 01:07:12.556443 env[1209]: time="2025-10-31T01:07:12.556421562Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 01:07:12.556443 env[1209]: time="2025-10-31T01:07:12.556438894Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 01:07:12.556514 env[1209]: time="2025-10-31T01:07:12.556494979Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 01:07:12.556514 env[1209]: time="2025-10-31T01:07:12.556508014Z" level=info msg="metadata content store policy set" policy=shared Oct 31 01:07:12.718469 systemd-logind[1199]: Watching system buttons on /dev/input/event1 (Power Button) Oct 31 01:07:12.718497 systemd-logind[1199]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 01:07:12.719778 systemd-logind[1199]: New seat seat0. Oct 31 01:07:12.726181 systemd[1]: Started systemd-logind.service. Oct 31 01:07:12.747083 update_engine[1201]: I1031 01:07:12.746891 1201 main.cc:92] Flatcar Update Engine starting Oct 31 01:07:12.764493 update_engine[1201]: I1031 01:07:12.749274 1201 update_check_scheduler.cc:74] Next update check in 4m23s Oct 31 01:07:12.749226 systemd[1]: Started update-engine.service. Oct 31 01:07:12.753867 systemd[1]: Started locksmithd.service. Oct 31 01:07:12.963884 locksmithd[1237]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 01:07:13.048747 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Oct 31 01:07:13.085306 extend-filesystems[1207]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 31 01:07:13.085306 extend-filesystems[1207]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 31 01:07:13.085306 extend-filesystems[1207]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Oct 31 01:07:13.097482 extend-filesystems[1182]: Resized filesystem in /dev/vda9 Oct 31 01:07:13.099017 bash[1230]: Updated "/home/core/.ssh/authorized_keys" Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.087479675Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.087694739Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.087744993Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.087852554Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.087874025Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088011272Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088023475Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088039515Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088073198Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088090471Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088106851Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088135555Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088662684Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 01:07:13.099139 env[1209]: time="2025-10-31T01:07:13.088864212Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 01:07:13.088659 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089464377Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089519090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089535491Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089616503Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089633484Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089651087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089713284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089739263Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089750784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089761314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089775090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089799295Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089962511Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089979453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099743 env[1209]: time="2025-10-31T01:07:13.089992227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.088853 systemd[1]: Finished extend-filesystems.service. Oct 31 01:07:13.100144 env[1209]: time="2025-10-31T01:07:13.090003729Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 01:07:13.100144 env[1209]: time="2025-10-31T01:07:13.090023376Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 01:07:13.100144 env[1209]: time="2025-10-31T01:07:13.090036981Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 01:07:13.100144 env[1209]: time="2025-10-31T01:07:13.090075203Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 01:07:13.100144 env[1209]: time="2025-10-31T01:07:13.090149662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 01:07:13.099115 systemd[1]: Started containerd.service. Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.090481104Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.090561926Z" level=info msg="Connect containerd service" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.090616899Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.091490186Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.091703005Z" level=info msg="Start subscribing containerd event" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.091941523Z" level=info msg="Start recovering state" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.092230815Z" level=info msg="Start event monitor" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.092286069Z" level=info msg="Start snapshots syncer" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.092312799Z" level=info msg="Start cni network conf syncer for default" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.092331394Z" level=info msg="Start streaming server" Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.098402309Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.098456130Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 01:07:13.100291 env[1209]: time="2025-10-31T01:07:13.098515351Z" level=info msg="containerd successfully booted in 0.572687s" Oct 31 01:07:13.100942 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 01:07:13.997325 sshd_keygen[1200]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 01:07:14.030091 systemd[1]: Finished sshd-keygen.service. Oct 31 01:07:14.035292 systemd[1]: Starting issuegen.service... Oct 31 01:07:14.041379 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 01:07:14.042146 systemd[1]: Finished issuegen.service. Oct 31 01:07:14.046606 systemd[1]: Starting systemd-user-sessions.service... Oct 31 01:07:14.091886 systemd[1]: Finished systemd-user-sessions.service. Oct 31 01:07:14.095472 systemd[1]: Started getty@tty1.service. Oct 31 01:07:14.099573 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 01:07:14.101639 systemd[1]: Reached target getty.target. Oct 31 01:07:14.785574 systemd[1]: Started kubelet.service. Oct 31 01:07:14.787760 systemd[1]: Reached target multi-user.target. Oct 31 01:07:14.791141 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 01:07:14.799242 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 01:07:14.799406 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 01:07:14.811175 systemd[1]: Startup finished in 1.258s (kernel) + 5.137s (initrd) + 11.389s (userspace) = 17.786s. Oct 31 01:07:15.274238 kubelet[1258]: E1031 01:07:15.274170 1258 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 01:07:15.275634 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 01:07:15.275814 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 01:07:15.276081 systemd[1]: kubelet.service: Consumed 2.065s CPU time. Oct 31 01:07:21.956078 systemd[1]: Created slice system-sshd.slice. Oct 31 01:07:21.957344 systemd[1]: Started sshd@0-10.0.0.30:22-10.0.0.1:55540.service. Oct 31 01:07:22.004355 sshd[1267]: Accepted publickey for core from 10.0.0.1 port 55540 ssh2: RSA SHA256:lsD8JPjicOMb4IdtMa09c7waD0RtiIVSezpSCib1Gvc Oct 31 01:07:22.006921 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.015703 systemd[1]: Created slice user-500.slice. Oct 31 01:07:22.016810 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 01:07:22.018719 systemd-logind[1199]: New session 1 of user core. Oct 31 01:07:22.026936 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 01:07:22.028421 systemd[1]: Starting user@500.service... Oct 31 01:07:22.031938 (systemd)[1270]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.124444 systemd[1270]: Queued start job for default target default.target. Oct 31 01:07:22.125187 systemd[1270]: Reached target paths.target. Oct 31 01:07:22.125213 systemd[1270]: Reached target sockets.target. Oct 31 01:07:22.125228 systemd[1270]: Reached target timers.target. Oct 31 01:07:22.125241 systemd[1270]: Reached target basic.target. Oct 31 01:07:22.125368 systemd[1]: Started user@500.service. Oct 31 01:07:22.126398 systemd[1]: Started session-1.scope. Oct 31 01:07:22.126604 systemd[1270]: Reached target default.target. Oct 31 01:07:22.126656 systemd[1270]: Startup finished in 86ms. Oct 31 01:07:22.181851 systemd[1]: Started sshd@1-10.0.0.30:22-10.0.0.1:55542.service. Oct 31 01:07:22.227692 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 55542 ssh2: RSA SHA256:lsD8JPjicOMb4IdtMa09c7waD0RtiIVSezpSCib1Gvc Oct 31 01:07:22.229078 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.235361 systemd-logind[1199]: New session 2 of user core. Oct 31 01:07:22.236529 systemd[1]: Started session-2.scope. Oct 31 01:07:22.292254 sshd[1279]: pam_unix(sshd:session): session closed for user core Oct 31 01:07:22.295426 systemd[1]: sshd@1-10.0.0.30:22-10.0.0.1:55542.service: Deactivated successfully. Oct 31 01:07:22.296111 systemd[1]: session-2.scope: Deactivated successfully. Oct 31 01:07:22.296697 systemd-logind[1199]: Session 2 logged out. Waiting for processes to exit. Oct 31 01:07:22.297889 systemd[1]: Started sshd@2-10.0.0.30:22-10.0.0.1:55550.service. Oct 31 01:07:22.298626 systemd-logind[1199]: Removed session 2. Oct 31 01:07:22.337171 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 55550 ssh2: RSA SHA256:lsD8JPjicOMb4IdtMa09c7waD0RtiIVSezpSCib1Gvc Oct 31 01:07:22.338641 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.344184 systemd-logind[1199]: New session 3 of user core. Oct 31 01:07:22.345030 systemd[1]: Started session-3.scope. Oct 31 01:07:22.397757 sshd[1285]: pam_unix(sshd:session): session closed for user core Oct 31 01:07:22.400852 systemd[1]: sshd@2-10.0.0.30:22-10.0.0.1:55550.service: Deactivated successfully. Oct 31 01:07:22.401488 systemd[1]: session-3.scope: Deactivated successfully. Oct 31 01:07:22.402030 systemd-logind[1199]: Session 3 logged out. Waiting for processes to exit. Oct 31 01:07:22.403135 systemd[1]: Started sshd@3-10.0.0.30:22-10.0.0.1:55552.service. Oct 31 01:07:22.403793 systemd-logind[1199]: Removed session 3. Oct 31 01:07:22.445652 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 55552 ssh2: RSA SHA256:lsD8JPjicOMb4IdtMa09c7waD0RtiIVSezpSCib1Gvc Oct 31 01:07:22.446933 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.450584 systemd-logind[1199]: New session 4 of user core. Oct 31 01:07:22.451313 systemd[1]: Started session-4.scope. Oct 31 01:07:22.504417 sshd[1291]: pam_unix(sshd:session): session closed for user core Oct 31 01:07:22.507917 systemd[1]: sshd@3-10.0.0.30:22-10.0.0.1:55552.service: Deactivated successfully. Oct 31 01:07:22.508602 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 01:07:22.509256 systemd-logind[1199]: Session 4 logged out. Waiting for processes to exit. Oct 31 01:07:22.510595 systemd[1]: Started sshd@4-10.0.0.30:22-10.0.0.1:55558.service. Oct 31 01:07:22.511357 systemd-logind[1199]: Removed session 4. Oct 31 01:07:22.550179 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 55558 ssh2: RSA SHA256:lsD8JPjicOMb4IdtMa09c7waD0RtiIVSezpSCib1Gvc Oct 31 01:07:22.551892 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.555919 systemd-logind[1199]: New session 5 of user core. Oct 31 01:07:22.556998 systemd[1]: Started session-5.scope. Oct 31 01:07:22.616958 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 01:07:22.617361 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:07:22.626985 dbus-daemon[1180]: Ѝ\u00075rU: received setenforce notice (enforcing=-556428160) Oct 31 01:07:22.629039 sudo[1300]: pam_unix(sudo:session): session closed for user root Oct 31 01:07:22.631120 sshd[1297]: pam_unix(sshd:session): session closed for user core Oct 31 01:07:22.636048 systemd[1]: sshd@4-10.0.0.30:22-10.0.0.1:55558.service: Deactivated successfully. Oct 31 01:07:22.637009 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 01:07:22.637836 systemd-logind[1199]: Session 5 logged out. Waiting for processes to exit. Oct 31 01:07:22.639830 systemd[1]: Started sshd@5-10.0.0.30:22-10.0.0.1:55564.service. Oct 31 01:07:22.641698 systemd-logind[1199]: Removed session 5. Oct 31 01:07:22.680669 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 55564 ssh2: RSA SHA256:lsD8JPjicOMb4IdtMa09c7waD0RtiIVSezpSCib1Gvc Oct 31 01:07:22.681889 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.686652 systemd-logind[1199]: New session 6 of user core. Oct 31 01:07:22.687426 systemd[1]: Started session-6.scope. Oct 31 01:07:22.745661 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 01:07:22.745978 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:07:22.749530 sudo[1308]: pam_unix(sudo:session): session closed for user root Oct 31 01:07:22.757360 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 01:07:22.757794 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:07:22.770426 systemd[1]: Stopping audit-rules.service... Oct 31 01:07:22.770000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:07:22.772621 auditctl[1311]: No rules Oct 31 01:07:22.773140 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 01:07:22.773280 kernel: kauditd_printk_skb: 213 callbacks suppressed Oct 31 01:07:22.773363 kernel: audit: type=1305 audit(1761872842.770:191): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 01:07:22.773368 systemd[1]: Stopped audit-rules.service. Oct 31 01:07:22.775266 systemd[1]: Starting audit-rules.service... Oct 31 01:07:22.770000 audit[1311]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe11c03af0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:22.785060 kernel: audit: type=1300 audit(1761872842.770:191): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe11c03af0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:22.785143 kernel: audit: type=1327 audit(1761872842.770:191): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:07:22.770000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 01:07:22.787439 kernel: audit: type=1131 audit(1761872842.772:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.792057 augenrules[1328]: No rules Oct 31 01:07:22.792596 systemd[1]: Finished audit-rules.service. Oct 31 01:07:22.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.793778 sudo[1307]: pam_unix(sudo:session): session closed for user root Oct 31 01:07:22.795579 sshd[1304]: pam_unix(sshd:session): session closed for user core Oct 31 01:07:22.799285 kernel: audit: type=1130 audit(1761872842.792:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.799329 kernel: audit: type=1106 audit(1761872842.792:194): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.792000 audit[1307]: USER_END pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.799372 systemd[1]: Started sshd@6-10.0.0.30:22-10.0.0.1:55576.service. Oct 31 01:07:22.799768 systemd[1]: sshd@5-10.0.0.30:22-10.0.0.1:55564.service: Deactivated successfully. Oct 31 01:07:22.800305 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 01:07:22.801415 systemd-logind[1199]: Session 6 logged out. Waiting for processes to exit. Oct 31 01:07:22.802335 systemd-logind[1199]: Removed session 6. Oct 31 01:07:22.792000 audit[1307]: CRED_DISP pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.850759 kernel: audit: type=1104 audit(1761872842.792:195): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.792000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.867462 kernel: audit: type=1106 audit(1761872842.792:196): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.867535 kernel: audit: type=1104 audit(1761872842.792:197): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.792000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:55576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.880761 sshd[1333]: Accepted publickey for core from 10.0.0.1 port 55576 ssh2: RSA SHA256:lsD8JPjicOMb4IdtMa09c7waD0RtiIVSezpSCib1Gvc Oct 31 01:07:22.882856 kernel: audit: type=1130 audit(1761872842.798:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:55576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.30:22-10.0.0.1:55564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.879000 audit[1333]: USER_ACCT pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.882000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.882000 audit[1333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5a11dd30 a2=3 a3=0 items=0 ppid=1 pid=1333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:22.882000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 01:07:22.883232 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 01:07:22.887259 systemd-logind[1199]: New session 7 of user core. Oct 31 01:07:22.888020 systemd[1]: Started session-7.scope. Oct 31 01:07:22.892000 audit[1333]: USER_START pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.894000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:22.941000 audit[1337]: USER_ACCT pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.941000 audit[1337]: CRED_REFR pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.942085 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 01:07:22.942261 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 01:07:22.943000 audit[1337]: USER_START pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.954027 systemd[1]: Starting coreos-metadata.service... Oct 31 01:07:22.960612 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 31 01:07:22.960791 systemd[1]: Finished coreos-metadata.service. Oct 31 01:07:22.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:22.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:23.774095 systemd[1]: Stopped kubelet.service. Oct 31 01:07:23.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:23.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:23.774294 systemd[1]: kubelet.service: Consumed 2.065s CPU time. Oct 31 01:07:23.776229 systemd[1]: Starting kubelet.service... Oct 31 01:07:23.797892 systemd[1]: Reloading. Oct 31 01:07:23.889325 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-10-31T01:07:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 01:07:23.889373 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-10-31T01:07:23Z" level=info msg="torcx already run" Oct 31 01:07:24.031595 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 01:07:24.031612 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 01:07:24.050218 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit: BPF prog-id=40 op=LOAD Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.108000 audit: BPF prog-id=41 op=LOAD Oct 31 01:07:24.108000 audit: BPF prog-id=24 op=UNLOAD Oct 31 01:07:24.108000 audit: BPF prog-id=25 op=UNLOAD Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.110000 audit: BPF prog-id=42 op=LOAD Oct 31 01:07:24.110000 audit: BPF prog-id=34 op=UNLOAD Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.111000 audit: BPF prog-id=43 op=LOAD Oct 31 01:07:24.111000 audit: BPF prog-id=33 op=UNLOAD Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit: BPF prog-id=44 op=LOAD Oct 31 01:07:24.112000 audit: BPF prog-id=38 op=UNLOAD Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.112000 audit: BPF prog-id=45 op=LOAD Oct 31 01:07:24.112000 audit: BPF prog-id=26 op=UNLOAD Oct 31 01:07:24.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit: BPF prog-id=46 op=LOAD Oct 31 01:07:24.114000 audit: BPF prog-id=35 op=UNLOAD Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit: BPF prog-id=47 op=LOAD Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit: BPF prog-id=48 op=LOAD Oct 31 01:07:24.114000 audit: BPF prog-id=36 op=UNLOAD Oct 31 01:07:24.114000 audit: BPF prog-id=37 op=UNLOAD Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit: BPF prog-id=49 op=LOAD Oct 31 01:07:24.115000 audit: BPF prog-id=27 op=UNLOAD Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit: BPF prog-id=50 op=LOAD Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit: BPF prog-id=51 op=LOAD Oct 31 01:07:24.115000 audit: BPF prog-id=28 op=UNLOAD Oct 31 01:07:24.115000 audit: BPF prog-id=29 op=UNLOAD Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit: BPF prog-id=52 op=LOAD Oct 31 01:07:24.116000 audit: BPF prog-id=30 op=UNLOAD Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit: BPF prog-id=53 op=LOAD Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.116000 audit: BPF prog-id=54 op=LOAD Oct 31 01:07:24.116000 audit: BPF prog-id=31 op=UNLOAD Oct 31 01:07:24.116000 audit: BPF prog-id=32 op=UNLOAD Oct 31 01:07:24.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:24.126707 systemd[1]: Started kubelet.service. Oct 31 01:07:24.130555 systemd[1]: Stopping kubelet.service... Oct 31 01:07:24.131332 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 01:07:24.131500 systemd[1]: Stopped kubelet.service. Oct 31 01:07:24.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:24.132940 systemd[1]: Starting kubelet.service... Oct 31 01:07:24.237544 systemd[1]: Started kubelet.service. Oct 31 01:07:24.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:24.318678 kubelet[1444]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:07:24.318678 kubelet[1444]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 01:07:24.318678 kubelet[1444]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 01:07:24.318678 kubelet[1444]: I1031 01:07:24.318633 1444 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 01:07:24.504248 kubelet[1444]: I1031 01:07:24.504170 1444 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 31 01:07:24.504248 kubelet[1444]: I1031 01:07:24.504231 1444 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 01:07:24.504912 kubelet[1444]: I1031 01:07:24.504856 1444 server.go:954] "Client rotation is on, will bootstrap in background" Oct 31 01:07:24.547752 kubelet[1444]: I1031 01:07:24.547411 1444 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 01:07:24.561032 kubelet[1444]: E1031 01:07:24.560983 1444 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 01:07:24.561032 kubelet[1444]: I1031 01:07:24.561023 1444 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 01:07:24.566266 kubelet[1444]: I1031 01:07:24.566221 1444 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 01:07:24.567532 kubelet[1444]: I1031 01:07:24.567475 1444 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 01:07:24.567749 kubelet[1444]: I1031 01:07:24.567522 1444 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.30","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 01:07:24.567892 kubelet[1444]: I1031 01:07:24.567756 1444 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 01:07:24.567892 kubelet[1444]: I1031 01:07:24.567771 1444 container_manager_linux.go:304] "Creating device plugin manager" Oct 31 01:07:24.567958 kubelet[1444]: I1031 01:07:24.567924 1444 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:07:24.572838 kubelet[1444]: I1031 01:07:24.572295 1444 kubelet.go:446] "Attempting to sync node with API server" Oct 31 01:07:24.572838 kubelet[1444]: I1031 01:07:24.572325 1444 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 01:07:24.572838 kubelet[1444]: I1031 01:07:24.572361 1444 kubelet.go:352] "Adding apiserver pod source" Oct 31 01:07:24.572838 kubelet[1444]: I1031 01:07:24.572376 1444 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 01:07:24.572838 kubelet[1444]: E1031 01:07:24.572572 1444 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:24.572838 kubelet[1444]: E1031 01:07:24.572655 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:24.613950 kubelet[1444]: I1031 01:07:24.613898 1444 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 01:07:24.614860 kubelet[1444]: I1031 01:07:24.614496 1444 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 31 01:07:24.614860 kubelet[1444]: W1031 01:07:24.614563 1444 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 01:07:24.616746 kubelet[1444]: W1031 01:07:24.616683 1444 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 31 01:07:24.616806 kubelet[1444]: E1031 01:07:24.616748 1444 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Oct 31 01:07:24.616921 kubelet[1444]: I1031 01:07:24.616887 1444 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 01:07:24.617018 kubelet[1444]: I1031 01:07:24.616935 1444 server.go:1287] "Started kubelet" Oct 31 01:07:24.617125 kubelet[1444]: I1031 01:07:24.617081 1444 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 01:07:24.618364 kubelet[1444]: I1031 01:07:24.618333 1444 server.go:479] "Adding debug handlers to kubelet server" Oct 31 01:07:24.642601 kubelet[1444]: I1031 01:07:24.642416 1444 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 01:07:24.643059 kubelet[1444]: W1031 01:07:24.642796 1444 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.30" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 31 01:07:24.643059 kubelet[1444]: E1031 01:07:24.642843 1444 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.30\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Oct 31 01:07:24.643059 kubelet[1444]: I1031 01:07:24.642944 1444 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 01:07:24.643000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.643000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:07:24.643000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002c73e0 a1=c0001bc990 a2=c0002c7350 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:24.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:07:24.644000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:24.644000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:07:24.644000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000500ba0 a1=c0001bc9a8 a2=c0002c7500 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:24.644000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:07:24.645354 kubelet[1444]: I1031 01:07:24.644542 1444 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 01:07:24.645354 kubelet[1444]: I1031 01:07:24.644822 1444 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 01:07:24.645354 kubelet[1444]: I1031 01:07:24.644952 1444 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 01:07:24.645635 kubelet[1444]: I1031 01:07:24.645528 1444 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 01:07:24.647791 kubelet[1444]: E1031 01:07:24.647760 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:24.647865 kubelet[1444]: I1031 01:07:24.647816 1444 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 01:07:24.648197 kubelet[1444]: I1031 01:07:24.648087 1444 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 01:07:24.648197 kubelet[1444]: I1031 01:07:24.648172 1444 reconciler.go:26] "Reconciler: start to sync state" Oct 31 01:07:24.649291 kubelet[1444]: I1031 01:07:24.649248 1444 factory.go:221] Registration of the systemd container factory successfully Oct 31 01:07:24.649348 kubelet[1444]: E1031 01:07:24.649327 1444 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 01:07:24.649491 kubelet[1444]: I1031 01:07:24.649453 1444 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 01:07:24.651501 kubelet[1444]: I1031 01:07:24.651445 1444 factory.go:221] Registration of the containerd container factory successfully Oct 31 01:07:24.703904 kubelet[1444]: W1031 01:07:24.703851 1444 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 31 01:07:24.704043 kubelet[1444]: E1031 01:07:24.703922 1444 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Oct 31 01:07:24.705521 kubelet[1444]: E1031 01:07:24.704070 1444 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.30.18736e0472cc36ba default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.30,UID:10.0.0.30,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.30,},FirstTimestamp:2025-10-31 01:07:24.616906426 +0000 UTC m=+0.363096176,LastTimestamp:2025-10-31 01:07:24.616906426 +0000 UTC m=+0.363096176,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.30,}" Oct 31 01:07:24.705879 kubelet[1444]: E1031 01:07:24.705824 1444 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.30\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Oct 31 01:07:24.707928 kubelet[1444]: I1031 01:07:24.707901 1444 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 01:07:24.707928 kubelet[1444]: I1031 01:07:24.707920 1444 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 01:07:24.708042 kubelet[1444]: I1031 01:07:24.707936 1444 state_mem.go:36] "Initialized new in-memory state store" Oct 31 01:07:24.748057 kubelet[1444]: E1031 01:07:24.747983 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:24.848636 kubelet[1444]: E1031 01:07:24.848476 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:24.950484 kubelet[1444]: E1031 01:07:24.948691 1444 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.30\" not found" node="10.0.0.30" Oct 31 01:07:24.950484 kubelet[1444]: E1031 01:07:24.948855 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:25.049747 kubelet[1444]: E1031 01:07:25.049619 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:25.150806 kubelet[1444]: E1031 01:07:25.150574 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:25.251258 kubelet[1444]: E1031 01:07:25.251200 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:25.351949 kubelet[1444]: E1031 01:07:25.351883 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:25.368000 audit[1459]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.368000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9c470300 a2=0 a3=7ffd9c4702ec items=0 ppid=1444 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:07:25.369000 audit[1466]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.369000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc20c611a0 a2=0 a3=7ffc20c6118c items=0 ppid=1444 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:07:25.398747 kubelet[1444]: I1031 01:07:25.398634 1444 policy_none.go:49] "None policy: Start" Oct 31 01:07:25.399670 kubelet[1444]: I1031 01:07:25.399635 1444 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 01:07:25.399670 kubelet[1444]: I1031 01:07:25.399664 1444 state_mem.go:35] "Initializing new in-memory state store" Oct 31 01:07:25.371000 audit[1468]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.371000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc0592e30 a2=0 a3=7fffc0592e1c items=0 ppid=1444 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:07:25.406000 audit[1473]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.406000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff4ddaf6b0 a2=0 a3=7fff4ddaf69c items=0 ppid=1444 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:07:25.452955 kubelet[1444]: E1031 01:07:25.452867 1444 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Oct 31 01:07:25.489981 systemd[1]: Created slice kubepods.slice. Oct 31 01:07:25.494980 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 01:07:25.498208 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 01:07:25.503568 kubelet[1444]: I1031 01:07:25.503541 1444 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 31 01:07:25.502000 audit[1444]: AVC avc: denied { mac_admin } for pid=1444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:25.502000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 01:07:25.502000 audit[1444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b3e270 a1=c000b7d0c8 a2=c000b3e240 a3=25 items=0 ppid=1 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.502000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 01:07:25.504499 kubelet[1444]: I1031 01:07:25.503873 1444 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 31 01:07:25.504499 kubelet[1444]: I1031 01:07:25.504017 1444 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 01:07:25.504499 kubelet[1444]: I1031 01:07:25.504030 1444 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 01:07:25.504499 kubelet[1444]: I1031 01:07:25.504317 1444 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 01:07:25.506217 kubelet[1444]: E1031 01:07:25.506175 1444 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 01:07:25.506291 kubelet[1444]: E1031 01:07:25.506240 1444 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.30\" not found" Oct 31 01:07:25.508822 kubelet[1444]: I1031 01:07:25.508781 1444 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 31 01:07:25.509084 kubelet[1444]: E1031 01:07:25.508979 1444 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.15:6443/api/v1/namespaces/default/events\": read tcp 10.0.0.30:43244->10.0.0.15:6443: use of closed network connection" event="&Event{ObjectMeta:{10.0.0.30.18736e04781d8e0f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.30,UID:10.0.0.30,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.30 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.30,},FirstTimestamp:2025-10-31 01:07:24.706123279 +0000 UTC m=+0.452313029,LastTimestamp:2025-10-31 01:07:24.706123279 +0000 UTC m=+0.452313029,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.30,}" Oct 31 01:07:25.513000 audit[1478]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.513000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe2aac8a90 a2=0 a3=7ffe2aac8a7c items=0 ppid=1444 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 31 01:07:25.514768 kubelet[1444]: I1031 01:07:25.514681 1444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 31 01:07:25.514000 audit[1480]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.514000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff03df3650 a2=0 a3=7fff03df363c items=0 ppid=1444 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:07:25.515000 audit[1479]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:25.515000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef8dc76d0 a2=0 a3=7ffef8dc76bc items=0 ppid=1444 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 01:07:25.516274 kubelet[1444]: I1031 01:07:25.516243 1444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 31 01:07:25.516337 kubelet[1444]: I1031 01:07:25.516291 1444 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 31 01:07:25.516337 kubelet[1444]: I1031 01:07:25.516336 1444 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 01:07:25.516400 kubelet[1444]: I1031 01:07:25.516346 1444 kubelet.go:2382] "Starting kubelet main sync loop" Oct 31 01:07:25.516534 kubelet[1444]: E1031 01:07:25.516505 1444 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 31 01:07:25.515000 audit[1481]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.515000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd67754a70 a2=0 a3=7ffd67754a5c items=0 ppid=1444 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:07:25.516000 audit[1482]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:25.516000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3ca217e0 a2=0 a3=7fff3ca217cc items=0 ppid=1444 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 01:07:25.517000 audit[1483]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:25.517000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7e3f50e0 a2=0 a3=7ffe7e3f50cc items=0 ppid=1444 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:07:25.518000 audit[1484]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:25.518000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd65a6cca0 a2=0 a3=7ffd65a6cc8c items=0 ppid=1444 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 01:07:25.519000 audit[1485]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:25.519000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebdc07220 a2=0 a3=7ffebdc0720c items=0 ppid=1444 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:25.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 01:07:25.573566 kubelet[1444]: E1031 01:07:25.573481 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:25.606088 kubelet[1444]: I1031 01:07:25.606054 1444 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.30" Oct 31 01:07:25.635712 kubelet[1444]: I1031 01:07:25.635616 1444 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.30" Oct 31 01:07:25.635712 kubelet[1444]: E1031 01:07:25.635675 1444 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.30\": node \"10.0.0.30\" not found" Oct 31 01:07:26.248487 kubelet[1444]: I1031 01:07:26.248439 1444 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 31 01:07:26.249094 env[1209]: time="2025-10-31T01:07:26.249001306Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 01:07:26.249473 kubelet[1444]: I1031 01:07:26.249238 1444 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 31 01:07:26.295854 sudo[1337]: pam_unix(sudo:session): session closed for user root Oct 31 01:07:26.295000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:26.295000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 01:07:26.297589 sshd[1333]: pam_unix(sshd:session): session closed for user core Oct 31 01:07:26.298000 audit[1333]: USER_END pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:26.298000 audit[1333]: CRED_DISP pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 31 01:07:26.300623 systemd[1]: sshd@6-10.0.0.30:22-10.0.0.1:55576.service: Deactivated successfully. Oct 31 01:07:26.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:55576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 01:07:26.301348 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 01:07:26.301976 systemd-logind[1199]: Session 7 logged out. Waiting for processes to exit. Oct 31 01:07:26.303020 systemd-logind[1199]: Removed session 7. Oct 31 01:07:26.574057 kubelet[1444]: E1031 01:07:26.573903 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:26.574057 kubelet[1444]: I1031 01:07:26.574042 1444 apiserver.go:52] "Watching apiserver" Oct 31 01:07:26.577577 kubelet[1444]: E1031 01:07:26.577510 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:26.583427 systemd[1]: Created slice kubepods-besteffort-podcdb091d1_63a2_40b0_8635_41a1e1eed0d3.slice. Oct 31 01:07:26.593756 systemd[1]: Created slice kubepods-besteffort-pod4552d67b_d429_40be_af94_33a6a992c0a4.slice. Oct 31 01:07:26.649461 kubelet[1444]: I1031 01:07:26.649385 1444 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 01:07:26.663997 kubelet[1444]: I1031 01:07:26.663922 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-xtables-lock\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.663997 kubelet[1444]: I1031 01:07:26.663970 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/329a10ac-4edf-49f3-88c8-aa1c4184c6de-kubelet-dir\") pod \"csi-node-driver-8wv96\" (UID: \"329a10ac-4edf-49f3-88c8-aa1c4184c6de\") " pod="calico-system/csi-node-driver-8wv96" Oct 31 01:07:26.663997 kubelet[1444]: I1031 01:07:26.663995 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/329a10ac-4edf-49f3-88c8-aa1c4184c6de-socket-dir\") pod \"csi-node-driver-8wv96\" (UID: \"329a10ac-4edf-49f3-88c8-aa1c4184c6de\") " pod="calico-system/csi-node-driver-8wv96" Oct 31 01:07:26.663997 kubelet[1444]: I1031 01:07:26.664018 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-cni-log-dir\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664346 kubelet[1444]: I1031 01:07:26.664078 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-cni-net-dir\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664346 kubelet[1444]: I1031 01:07:26.664134 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-lib-modules\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664346 kubelet[1444]: I1031 01:07:26.664153 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4552d67b-d429-40be-af94-33a6a992c0a4-tigera-ca-bundle\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664346 kubelet[1444]: I1031 01:07:26.664176 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/329a10ac-4edf-49f3-88c8-aa1c4184c6de-varrun\") pod \"csi-node-driver-8wv96\" (UID: \"329a10ac-4edf-49f3-88c8-aa1c4184c6de\") " pod="calico-system/csi-node-driver-8wv96" Oct 31 01:07:26.664346 kubelet[1444]: I1031 01:07:26.664196 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-cni-bin-dir\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664504 kubelet[1444]: I1031 01:07:26.664214 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-var-run-calico\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664504 kubelet[1444]: I1031 01:07:26.664231 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cdb091d1-63a2-40b0-8635-41a1e1eed0d3-kube-proxy\") pod \"kube-proxy-w9qqd\" (UID: \"cdb091d1-63a2-40b0-8635-41a1e1eed0d3\") " pod="kube-system/kube-proxy-w9qqd" Oct 31 01:07:26.664504 kubelet[1444]: I1031 01:07:26.664249 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cdb091d1-63a2-40b0-8635-41a1e1eed0d3-lib-modules\") pod \"kube-proxy-w9qqd\" (UID: \"cdb091d1-63a2-40b0-8635-41a1e1eed0d3\") " pod="kube-system/kube-proxy-w9qqd" Oct 31 01:07:26.664504 kubelet[1444]: I1031 01:07:26.664267 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xfpw6\" (UniqueName: \"kubernetes.io/projected/cdb091d1-63a2-40b0-8635-41a1e1eed0d3-kube-api-access-xfpw6\") pod \"kube-proxy-w9qqd\" (UID: \"cdb091d1-63a2-40b0-8635-41a1e1eed0d3\") " pod="kube-system/kube-proxy-w9qqd" Oct 31 01:07:26.664504 kubelet[1444]: I1031 01:07:26.664287 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-var-lib-calico\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664661 kubelet[1444]: I1031 01:07:26.664304 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9h5cg\" (UniqueName: \"kubernetes.io/projected/4552d67b-d429-40be-af94-33a6a992c0a4-kube-api-access-9h5cg\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664661 kubelet[1444]: I1031 01:07:26.664326 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/329a10ac-4edf-49f3-88c8-aa1c4184c6de-registration-dir\") pod \"csi-node-driver-8wv96\" (UID: \"329a10ac-4edf-49f3-88c8-aa1c4184c6de\") " pod="calico-system/csi-node-driver-8wv96" Oct 31 01:07:26.664661 kubelet[1444]: I1031 01:07:26.664345 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7nphb\" (UniqueName: \"kubernetes.io/projected/329a10ac-4edf-49f3-88c8-aa1c4184c6de-kube-api-access-7nphb\") pod \"csi-node-driver-8wv96\" (UID: \"329a10ac-4edf-49f3-88c8-aa1c4184c6de\") " pod="calico-system/csi-node-driver-8wv96" Oct 31 01:07:26.664661 kubelet[1444]: I1031 01:07:26.664363 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cdb091d1-63a2-40b0-8635-41a1e1eed0d3-xtables-lock\") pod \"kube-proxy-w9qqd\" (UID: \"cdb091d1-63a2-40b0-8635-41a1e1eed0d3\") " pod="kube-system/kube-proxy-w9qqd" Oct 31 01:07:26.664661 kubelet[1444]: I1031 01:07:26.664394 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-flexvol-driver-host\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664852 kubelet[1444]: I1031 01:07:26.664414 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4552d67b-d429-40be-af94-33a6a992c0a4-node-certs\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.664852 kubelet[1444]: I1031 01:07:26.664434 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4552d67b-d429-40be-af94-33a6a992c0a4-policysync\") pod \"calico-node-vzg8s\" (UID: \"4552d67b-d429-40be-af94-33a6a992c0a4\") " pod="calico-system/calico-node-vzg8s" Oct 31 01:07:26.765829 kubelet[1444]: I1031 01:07:26.765791 1444 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 01:07:26.766156 kubelet[1444]: E1031 01:07:26.766104 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.766156 kubelet[1444]: W1031 01:07:26.766138 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.766254 kubelet[1444]: E1031 01:07:26.766188 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.766564 kubelet[1444]: E1031 01:07:26.766547 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.766564 kubelet[1444]: W1031 01:07:26.766560 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.766671 kubelet[1444]: E1031 01:07:26.766572 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.766829 kubelet[1444]: E1031 01:07:26.766795 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.766829 kubelet[1444]: W1031 01:07:26.766808 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.766829 kubelet[1444]: E1031 01:07:26.766824 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.767086 kubelet[1444]: E1031 01:07:26.767069 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.767086 kubelet[1444]: W1031 01:07:26.767086 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.767176 kubelet[1444]: E1031 01:07:26.767149 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.767303 kubelet[1444]: E1031 01:07:26.767278 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.767303 kubelet[1444]: W1031 01:07:26.767288 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.767406 kubelet[1444]: E1031 01:07:26.767326 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.767493 kubelet[1444]: E1031 01:07:26.767480 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.767493 kubelet[1444]: W1031 01:07:26.767492 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.767590 kubelet[1444]: E1031 01:07:26.767518 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.767696 kubelet[1444]: E1031 01:07:26.767680 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.767696 kubelet[1444]: W1031 01:07:26.767691 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.767810 kubelet[1444]: E1031 01:07:26.767735 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.767916 kubelet[1444]: E1031 01:07:26.767895 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.767916 kubelet[1444]: W1031 01:07:26.767911 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.768040 kubelet[1444]: E1031 01:07:26.768020 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.768413 kubelet[1444]: E1031 01:07:26.768396 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.768413 kubelet[1444]: W1031 01:07:26.768406 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.768514 kubelet[1444]: E1031 01:07:26.768436 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.768651 kubelet[1444]: E1031 01:07:26.768626 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.768651 kubelet[1444]: W1031 01:07:26.768646 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.768747 kubelet[1444]: E1031 01:07:26.768676 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.768831 kubelet[1444]: E1031 01:07:26.768819 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.768894 kubelet[1444]: W1031 01:07:26.768837 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.768894 kubelet[1444]: E1031 01:07:26.768870 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.769027 kubelet[1444]: E1031 01:07:26.769012 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.769027 kubelet[1444]: W1031 01:07:26.769022 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.769110 kubelet[1444]: E1031 01:07:26.769052 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.769220 kubelet[1444]: E1031 01:07:26.769204 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.769220 kubelet[1444]: W1031 01:07:26.769214 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.769330 kubelet[1444]: E1031 01:07:26.769226 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.769433 kubelet[1444]: E1031 01:07:26.769418 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.769433 kubelet[1444]: W1031 01:07:26.769429 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.769506 kubelet[1444]: E1031 01:07:26.769443 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.769607 kubelet[1444]: E1031 01:07:26.769587 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.769607 kubelet[1444]: W1031 01:07:26.769604 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.769694 kubelet[1444]: E1031 01:07:26.769619 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.769857 kubelet[1444]: E1031 01:07:26.769843 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.769857 kubelet[1444]: W1031 01:07:26.769854 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.769934 kubelet[1444]: E1031 01:07:26.769865 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.770088 kubelet[1444]: E1031 01:07:26.770073 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.770088 kubelet[1444]: W1031 01:07:26.770082 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.770088 kubelet[1444]: E1031 01:07:26.770090 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.770263 kubelet[1444]: E1031 01:07:26.770251 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.770263 kubelet[1444]: W1031 01:07:26.770259 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.770327 kubelet[1444]: E1031 01:07:26.770267 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.770429 kubelet[1444]: E1031 01:07:26.770419 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.770429 kubelet[1444]: W1031 01:07:26.770427 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.770503 kubelet[1444]: E1031 01:07:26.770435 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.770602 kubelet[1444]: E1031 01:07:26.770588 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.770602 kubelet[1444]: W1031 01:07:26.770596 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.770602 kubelet[1444]: E1031 01:07:26.770604 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.771564 kubelet[1444]: E1031 01:07:26.771547 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.771564 kubelet[1444]: W1031 01:07:26.771558 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.771717 kubelet[1444]: E1031 01:07:26.771568 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.773063 kubelet[1444]: E1031 01:07:26.773028 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.773063 kubelet[1444]: W1031 01:07:26.773043 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.773063 kubelet[1444]: E1031 01:07:26.773055 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.773294 kubelet[1444]: E1031 01:07:26.773252 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.773294 kubelet[1444]: W1031 01:07:26.773261 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.773294 kubelet[1444]: E1031 01:07:26.773278 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.773467 kubelet[1444]: E1031 01:07:26.773450 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.773467 kubelet[1444]: W1031 01:07:26.773463 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.773550 kubelet[1444]: E1031 01:07:26.773472 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.777593 kubelet[1444]: E1031 01:07:26.777572 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.777681 kubelet[1444]: W1031 01:07:26.777660 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.777789 kubelet[1444]: E1031 01:07:26.777772 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.778963 kubelet[1444]: E1031 01:07:26.778947 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.779047 kubelet[1444]: W1031 01:07:26.779028 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.779153 kubelet[1444]: E1031 01:07:26.779134 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.785692 kubelet[1444]: E1031 01:07:26.785645 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:26.785692 kubelet[1444]: W1031 01:07:26.785673 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:26.785795 kubelet[1444]: E1031 01:07:26.785698 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:26.894797 kubelet[1444]: E1031 01:07:26.894594 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:26.895767 env[1209]: time="2025-10-31T01:07:26.895627461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w9qqd,Uid:cdb091d1-63a2-40b0-8635-41a1e1eed0d3,Namespace:kube-system,Attempt:0,}" Oct 31 01:07:26.896317 kubelet[1444]: E1031 01:07:26.896286 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:26.896686 env[1209]: time="2025-10-31T01:07:26.896635602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vzg8s,Uid:4552d67b-d429-40be-af94-33a6a992c0a4,Namespace:calico-system,Attempt:0,}" Oct 31 01:07:27.574263 kubelet[1444]: E1031 01:07:27.574217 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:28.221500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2347555610.mount: Deactivated successfully. Oct 31 01:07:28.233351 env[1209]: time="2025-10-31T01:07:28.233283113Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.234779 env[1209]: time="2025-10-31T01:07:28.234747910Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.238222 env[1209]: time="2025-10-31T01:07:28.238177682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.240257 env[1209]: time="2025-10-31T01:07:28.240216546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.241935 env[1209]: time="2025-10-31T01:07:28.241904211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.243122 env[1209]: time="2025-10-31T01:07:28.243087700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.244899 env[1209]: time="2025-10-31T01:07:28.244872056Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.246523 env[1209]: time="2025-10-31T01:07:28.246496673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:28.276778 env[1209]: time="2025-10-31T01:07:28.276658938Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:07:28.276778 env[1209]: time="2025-10-31T01:07:28.276775657Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:07:28.276984 env[1209]: time="2025-10-31T01:07:28.276808909Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:07:28.282577 env[1209]: time="2025-10-31T01:07:28.281581850Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb5e60b60b72393f407f12c247d5ee5f8ac8c192516265b2f88a1013538690e3 pid=1528 runtime=io.containerd.runc.v2 Oct 31 01:07:28.288877 env[1209]: time="2025-10-31T01:07:28.288805257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:07:28.289078 env[1209]: time="2025-10-31T01:07:28.288850772Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:07:28.289078 env[1209]: time="2025-10-31T01:07:28.288865279Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:07:28.289192 env[1209]: time="2025-10-31T01:07:28.289083739Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338 pid=1543 runtime=io.containerd.runc.v2 Oct 31 01:07:28.308700 systemd[1]: Started cri-containerd-164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338.scope. Oct 31 01:07:28.309809 systemd[1]: Started cri-containerd-fb5e60b60b72393f407f12c247d5ee5f8ac8c192516265b2f88a1013538690e3.scope. Oct 31 01:07:28.368646 kernel: kauditd_printk_skb: 243 callbacks suppressed Oct 31 01:07:28.368963 kernel: audit: type=1400 audit(1761872848.362:407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.380640 kernel: audit: type=1400 audit(1761872848.362:408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.380812 kernel: audit: type=1400 audit(1761872848.362:409): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.430055 kernel: audit: type=1400 audit(1761872848.362:410): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435359 kernel: audit: type=1400 audit(1761872848.362:411): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.440973 kernel: audit: type=1400 audit(1761872848.362:412): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.441035 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.442448 kernel: audit: type=1400 audit(1761872848.362:413): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.442484 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 01:07:28.442503 kernel: audit: backlog limit exceeded Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.423000 audit: BPF prog-id=55 op=LOAD Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1543 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346633346363363230333263376137653063383865316532306335 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=1543 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346633346363363230333263376137653063383865316532306335 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit: BPF prog-id=56 op=LOAD Oct 31 01:07:28.424000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.424000 audit: BPF prog-id=57 op=LOAD Oct 31 01:07:28.424000 audit[1554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002108b0 items=0 ppid=1543 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346633346363363230333263376137653063383865316532306335 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356536306236306237323339336634303766313263323437643565 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356536306236306237323339336634303766313263323437643565 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.434000 audit: BPF prog-id=58 op=LOAD Oct 31 01:07:28.435000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.435000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ba500 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.434000 audit[1554]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002108f8 items=0 ppid=1543 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356536306236306237323339336634303766313263323437643565 Oct 31 01:07:28.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346633346363363230333263376137653063383865316532306335 Oct 31 01:07:28.450000 audit: BPF prog-id=58 op=UNLOAD Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit: BPF prog-id=57 op=UNLOAD Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit: BPF prog-id=60 op=LOAD Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { perfmon } for pid=1554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ba548 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356536306236306237323339336634303766313263323437643565 Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit: BPF prog-id=60 op=UNLOAD Oct 31 01:07:28.450000 audit: BPF prog-id=59 op=UNLOAD Oct 31 01:07:28.450000 audit[1554]: AVC avc: denied { bpf } for pid=1554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit: BPF prog-id=61 op=LOAD Oct 31 01:07:28.450000 audit[1554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000210d08 items=0 ppid=1543 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346633346363363230333263376137653063383865316532306335 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:28.450000 audit: BPF prog-id=62 op=LOAD Oct 31 01:07:28.450000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ba958 items=0 ppid=1528 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:28.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356536306236306237323339336634303766313263323437643565 Oct 31 01:07:28.476885 env[1209]: time="2025-10-31T01:07:28.476751703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w9qqd,Uid:cdb091d1-63a2-40b0-8635-41a1e1eed0d3,Namespace:kube-system,Attempt:0,} returns sandbox id \"fb5e60b60b72393f407f12c247d5ee5f8ac8c192516265b2f88a1013538690e3\"" Oct 31 01:07:28.477800 kubelet[1444]: E1031 01:07:28.477776 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:28.478793 env[1209]: time="2025-10-31T01:07:28.478768205Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Oct 31 01:07:28.483439 env[1209]: time="2025-10-31T01:07:28.483405963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vzg8s,Uid:4552d67b-d429-40be-af94-33a6a992c0a4,Namespace:calico-system,Attempt:0,} returns sandbox id \"164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338\"" Oct 31 01:07:28.484037 kubelet[1444]: E1031 01:07:28.484008 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:28.517410 kubelet[1444]: E1031 01:07:28.517368 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:28.574581 kubelet[1444]: E1031 01:07:28.574510 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:29.576676 kubelet[1444]: E1031 01:07:29.576596 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:30.225615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount415819030.mount: Deactivated successfully. Oct 31 01:07:30.517568 kubelet[1444]: E1031 01:07:30.517419 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:30.577810 kubelet[1444]: E1031 01:07:30.577678 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:31.613038 kubelet[1444]: E1031 01:07:31.578602 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:32.517124 kubelet[1444]: E1031 01:07:32.517063 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:32.579147 kubelet[1444]: E1031 01:07:32.579087 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:32.625070 env[1209]: time="2025-10-31T01:07:32.625007554Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:32.703383 env[1209]: time="2025-10-31T01:07:32.703319467Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:32.827381 env[1209]: time="2025-10-31T01:07:32.827196911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:32.936960 env[1209]: time="2025-10-31T01:07:32.936841223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:32.937391 env[1209]: time="2025-10-31T01:07:32.937353544Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Oct 31 01:07:32.938623 env[1209]: time="2025-10-31T01:07:32.938569635Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 01:07:32.939910 env[1209]: time="2025-10-31T01:07:32.939877247Z" level=info msg="CreateContainer within sandbox \"fb5e60b60b72393f407f12c247d5ee5f8ac8c192516265b2f88a1013538690e3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 01:07:33.580396 kubelet[1444]: E1031 01:07:33.580315 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:33.764954 env[1209]: time="2025-10-31T01:07:33.764876134Z" level=info msg="CreateContainer within sandbox \"fb5e60b60b72393f407f12c247d5ee5f8ac8c192516265b2f88a1013538690e3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"914da0cf861d36f0fcd31cbb4884fae3685af0f14938a54ff57d8b8dae79da3a\"" Oct 31 01:07:33.765924 env[1209]: time="2025-10-31T01:07:33.765886559Z" level=info msg="StartContainer for \"914da0cf861d36f0fcd31cbb4884fae3685af0f14938a54ff57d8b8dae79da3a\"" Oct 31 01:07:33.792332 systemd[1]: run-containerd-runc-k8s.io-914da0cf861d36f0fcd31cbb4884fae3685af0f14938a54ff57d8b8dae79da3a-runc.OefGiu.mount: Deactivated successfully. Oct 31 01:07:33.793836 systemd[1]: Started cri-containerd-914da0cf861d36f0fcd31cbb4884fae3685af0f14938a54ff57d8b8dae79da3a.scope. Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.877684 kernel: kauditd_printk_skb: 106 callbacks suppressed Oct 31 01:07:33.877761 kernel: audit: type=1400 audit(1761872853.875:443): avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fec9ea12bd8 items=0 ppid=1528 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:33.891042 kernel: audit: type=1300 audit(1761872853.875:443): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fec9ea12bd8 items=0 ppid=1528 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:33.891113 kernel: audit: type=1327 audit(1761872853.875:443): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346461306366383631643336663066636433316362623438383466 Oct 31 01:07:33.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346461306366383631643336663066636433316362623438383466 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.903751 kernel: audit: type=1400 audit(1761872853.875:444): avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.903840 kernel: audit: type=1400 audit(1761872853.875:444): avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.914914 kernel: audit: type=1400 audit(1761872853.875:444): avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.915014 kernel: audit: type=1400 audit(1761872853.875:444): avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.926296 kernel: audit: type=1400 audit(1761872853.875:444): avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.929171 env[1209]: time="2025-10-31T01:07:33.927010614Z" level=info msg="StartContainer for \"914da0cf861d36f0fcd31cbb4884fae3685af0f14938a54ff57d8b8dae79da3a\" returns successfully" Oct 31 01:07:33.932253 kernel: audit: type=1400 audit(1761872853.875:444): avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.938216 kernel: audit: type=1400 audit(1761872853.875:444): avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.875000 audit: BPF prog-id=63 op=LOAD Oct 31 01:07:33.875000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0c58 items=0 ppid=1528 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:33.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346461306366383631643336663066636433316362623438383466 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.882000 audit: BPF prog-id=64 op=LOAD Oct 31 01:07:33.882000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a0ca8 items=0 ppid=1528 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:33.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346461306366383631643336663066636433316362623438383466 Oct 31 01:07:33.890000 audit: BPF prog-id=64 op=UNLOAD Oct 31 01:07:33.890000 audit: BPF prog-id=63 op=UNLOAD Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:33.890000 audit: BPF prog-id=65 op=LOAD Oct 31 01:07:33.890000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0d38 items=0 ppid=1528 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:33.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346461306366383631643336663066636433316362623438383466 Oct 31 01:07:34.051000 audit[1671]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.051000 audit[1672]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.051000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc91d6f410 a2=0 a3=7ffc91d6f3fc items=0 ppid=1620 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:07:34.053000 audit[1673]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.053000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd64b82320 a2=0 a3=7ffd64b8230c items=0 ppid=1620 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:07:34.051000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3b52db90 a2=0 a3=7ffd3b52db7c items=0 ppid=1620 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 01:07:34.054000 audit[1675]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.054000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc68955790 a2=0 a3=7ffc6895577c items=0 ppid=1620 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:07:34.056000 audit[1676]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.056000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfa12fb00 a2=0 a3=7ffcfa12faec items=0 ppid=1620 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 01:07:34.057000 audit[1677]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.057000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff995e4d20 a2=0 a3=7fff995e4d0c items=0 ppid=1620 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 01:07:34.156000 audit[1678]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.156000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd6a7f1d00 a2=0 a3=7ffd6a7f1cec items=0 ppid=1620 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:07:34.159000 audit[1680]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.159000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc9bc9af30 a2=0 a3=7ffc9bc9af1c items=0 ppid=1620 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 31 01:07:34.162000 audit[1683]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.162000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc76bbad30 a2=0 a3=7ffc76bbad1c items=0 ppid=1620 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 31 01:07:34.163000 audit[1684]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.163000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1bc61ad0 a2=0 a3=7ffc1bc61abc items=0 ppid=1620 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:07:34.165000 audit[1686]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.165000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff13144890 a2=0 a3=7fff1314487c items=0 ppid=1620 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:07:34.168000 audit[1687]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.168000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0fd46a90 a2=0 a3=7ffe0fd46a7c items=0 ppid=1620 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:07:34.170000 audit[1689]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.170000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd45882d70 a2=0 a3=7ffd45882d5c items=0 ppid=1620 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:07:34.173000 audit[1692]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.173000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee007ca70 a2=0 a3=7ffee007ca5c items=0 ppid=1620 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 31 01:07:34.173000 audit[1693]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.173000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb2cb9e40 a2=0 a3=7fffb2cb9e2c items=0 ppid=1620 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:07:34.175000 audit[1695]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.175000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff04b52db0 a2=0 a3=7fff04b52d9c items=0 ppid=1620 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:07:34.176000 audit[1696]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.176000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb6e23780 a2=0 a3=7fffb6e2376c items=0 ppid=1620 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:07:34.178000 audit[1698]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.178000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed66299c0 a2=0 a3=7ffed66299ac items=0 ppid=1620 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:07:34.181000 audit[1701]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.181000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc68041850 a2=0 a3=7ffc6804183c items=0 ppid=1620 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:07:34.184000 audit[1704]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.184000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6a576870 a2=0 a3=7ffd6a57685c items=0 ppid=1620 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:07:34.185000 audit[1705]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.185000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb4bbda70 a2=0 a3=7ffdb4bbda5c items=0 ppid=1620 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:07:34.188000 audit[1707]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.188000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffffc6f6b0 a2=0 a3=7fffffc6f69c items=0 ppid=1620 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:07:34.207000 audit[1711]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.207000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc3fe555b0 a2=0 a3=7ffc3fe5559c items=0 ppid=1620 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:07:34.208000 audit[1712]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.208000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccfed15b0 a2=0 a3=7ffccfed159c items=0 ppid=1620 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:07:34.210000 audit[1714]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 01:07:34.210000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd3b48aa90 a2=0 a3=7ffd3b48aa7c items=0 ppid=1620 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:07:34.229000 audit[1720]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:07:34.229000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffec33cdde0 a2=0 a3=7ffec33cddcc items=0 ppid=1620 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:07:34.250000 audit[1720]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:07:34.250000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffec33cdde0 a2=0 a3=7ffec33cddcc items=0 ppid=1620 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:07:34.260000 audit[1729]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.260000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcab84ba30 a2=0 a3=7ffcab84ba1c items=0 ppid=1620 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 01:07:34.262000 audit[1731]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.262000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3f29d2a0 a2=0 a3=7ffe3f29d28c items=0 ppid=1620 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 31 01:07:34.265000 audit[1734]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.265000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd123f0ef0 a2=0 a3=7ffd123f0edc items=0 ppid=1620 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 31 01:07:34.266000 audit[1735]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.266000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffb91c580 a2=0 a3=7ffffb91c56c items=0 ppid=1620 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 01:07:34.268000 audit[1737]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.268000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe848de420 a2=0 a3=7ffe848de40c items=0 ppid=1620 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 01:07:34.269000 audit[1738]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.269000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf379c130 a2=0 a3=7ffdf379c11c items=0 ppid=1620 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 01:07:34.271000 audit[1740]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.271000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea89dc940 a2=0 a3=7ffea89dc92c items=0 ppid=1620 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 31 01:07:34.274000 audit[1743]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.274000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd653b95d0 a2=0 a3=7ffd653b95bc items=0 ppid=1620 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 01:07:34.275000 audit[1744]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.275000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5cece7d0 a2=0 a3=7ffe5cece7bc items=0 ppid=1620 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 01:07:34.277000 audit[1746]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.277000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb0644350 a2=0 a3=7fffb064433c items=0 ppid=1620 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 01:07:34.278000 audit[1747]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.278000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd61146750 a2=0 a3=7ffd6114673c items=0 ppid=1620 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 01:07:34.280000 audit[1749]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.280000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff39a854f0 a2=0 a3=7fff39a854dc items=0 ppid=1620 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 01:07:34.283000 audit[1752]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.283000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcad7cfd60 a2=0 a3=7ffcad7cfd4c items=0 ppid=1620 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 01:07:34.286000 audit[1755]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.286000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd08650840 a2=0 a3=7ffd0865082c items=0 ppid=1620 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 31 01:07:34.287000 audit[1756]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.287000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc565ef60 a2=0 a3=7ffcc565ef4c items=0 ppid=1620 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 01:07:34.289000 audit[1758]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.289000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff67e466b0 a2=0 a3=7fff67e4669c items=0 ppid=1620 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:07:34.291000 audit[1761]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.291000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff30dc78d0 a2=0 a3=7fff30dc78bc items=0 ppid=1620 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 01:07:34.292000 audit[1762]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.292000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0d666c10 a2=0 a3=7ffe0d666bfc items=0 ppid=1620 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 01:07:34.294000 audit[1764]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.294000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffce15a1c40 a2=0 a3=7ffce15a1c2c items=0 ppid=1620 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 01:07:34.295000 audit[1765]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.295000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6f481e70 a2=0 a3=7ffc6f481e5c items=0 ppid=1620 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 01:07:34.297000 audit[1767]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.297000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeefcd0290 a2=0 a3=7ffeefcd027c items=0 ppid=1620 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:07:34.301000 audit[1770]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 01:07:34.301000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffff82d3fe0 a2=0 a3=7ffff82d3fcc items=0 ppid=1620 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 01:07:34.303000 audit[1772]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:07:34.303000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe6ed38d10 a2=0 a3=7ffe6ed38cfc items=0 ppid=1620 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.303000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:07:34.303000 audit[1772]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 01:07:34.303000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe6ed38d10 a2=0 a3=7ffe6ed38cfc items=0 ppid=1620 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:34.303000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:07:34.517228 kubelet[1444]: E1031 01:07:34.517166 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:34.537980 kubelet[1444]: E1031 01:07:34.537952 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:34.549465 kubelet[1444]: I1031 01:07:34.549363 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-w9qqd" podStartSLOduration=5.089385587 podStartE2EDuration="9.549343651s" podCreationTimestamp="2025-10-31 01:07:25 +0000 UTC" firstStartedPulling="2025-10-31 01:07:28.478394564 +0000 UTC m=+4.224584314" lastFinishedPulling="2025-10-31 01:07:32.938352608 +0000 UTC m=+8.684542378" observedRunningTime="2025-10-31 01:07:34.549096447 +0000 UTC m=+10.295286217" watchObservedRunningTime="2025-10-31 01:07:34.549343651 +0000 UTC m=+10.295533401" Oct 31 01:07:34.581359 kubelet[1444]: E1031 01:07:34.581318 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:34.609854 kubelet[1444]: E1031 01:07:34.609821 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.609854 kubelet[1444]: W1031 01:07:34.609847 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.610035 kubelet[1444]: E1031 01:07:34.609872 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.610035 kubelet[1444]: E1031 01:07:34.610010 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.610035 kubelet[1444]: W1031 01:07:34.610022 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.610099 kubelet[1444]: E1031 01:07:34.610035 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.610234 kubelet[1444]: E1031 01:07:34.610220 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.610234 kubelet[1444]: W1031 01:07:34.610231 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.610312 kubelet[1444]: E1031 01:07:34.610240 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.610451 kubelet[1444]: E1031 01:07:34.610437 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.610451 kubelet[1444]: W1031 01:07:34.610448 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.610517 kubelet[1444]: E1031 01:07:34.610457 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.610629 kubelet[1444]: E1031 01:07:34.610615 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.610629 kubelet[1444]: W1031 01:07:34.610625 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.610698 kubelet[1444]: E1031 01:07:34.610634 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.610806 kubelet[1444]: E1031 01:07:34.610787 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.610806 kubelet[1444]: W1031 01:07:34.610801 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.610870 kubelet[1444]: E1031 01:07:34.610809 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.610954 kubelet[1444]: E1031 01:07:34.610941 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.611003 kubelet[1444]: W1031 01:07:34.610971 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.611003 kubelet[1444]: E1031 01:07:34.610982 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.611193 kubelet[1444]: E1031 01:07:34.611172 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.611193 kubelet[1444]: W1031 01:07:34.611183 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.611278 kubelet[1444]: E1031 01:07:34.611196 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.611384 kubelet[1444]: E1031 01:07:34.611370 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.611384 kubelet[1444]: W1031 01:07:34.611380 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.611451 kubelet[1444]: E1031 01:07:34.611390 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.611557 kubelet[1444]: E1031 01:07:34.611546 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.611584 kubelet[1444]: W1031 01:07:34.611556 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.611584 kubelet[1444]: E1031 01:07:34.611565 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.611743 kubelet[1444]: E1031 01:07:34.611731 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.611743 kubelet[1444]: W1031 01:07:34.611741 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.611820 kubelet[1444]: E1031 01:07:34.611749 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.611905 kubelet[1444]: E1031 01:07:34.611891 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.611905 kubelet[1444]: W1031 01:07:34.611901 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.611969 kubelet[1444]: E1031 01:07:34.611909 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.612066 kubelet[1444]: E1031 01:07:34.612052 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.612066 kubelet[1444]: W1031 01:07:34.612062 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.612141 kubelet[1444]: E1031 01:07:34.612070 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.612236 kubelet[1444]: E1031 01:07:34.612222 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.612236 kubelet[1444]: W1031 01:07:34.612233 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.612305 kubelet[1444]: E1031 01:07:34.612241 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.612416 kubelet[1444]: E1031 01:07:34.612400 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.612416 kubelet[1444]: W1031 01:07:34.612410 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.612496 kubelet[1444]: E1031 01:07:34.612420 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.612576 kubelet[1444]: E1031 01:07:34.612562 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.612576 kubelet[1444]: W1031 01:07:34.612572 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.612640 kubelet[1444]: E1031 01:07:34.612581 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.612754 kubelet[1444]: E1031 01:07:34.612740 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.612754 kubelet[1444]: W1031 01:07:34.612753 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.612830 kubelet[1444]: E1031 01:07:34.612763 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.612915 kubelet[1444]: E1031 01:07:34.612901 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.612915 kubelet[1444]: W1031 01:07:34.612911 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.612978 kubelet[1444]: E1031 01:07:34.612919 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.613068 kubelet[1444]: E1031 01:07:34.613055 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.613068 kubelet[1444]: W1031 01:07:34.613065 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.613151 kubelet[1444]: E1031 01:07:34.613074 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.613235 kubelet[1444]: E1031 01:07:34.613221 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.613235 kubelet[1444]: W1031 01:07:34.613232 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.613299 kubelet[1444]: E1031 01:07:34.613241 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.622630 kubelet[1444]: E1031 01:07:34.622602 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.622630 kubelet[1444]: W1031 01:07:34.622614 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.622630 kubelet[1444]: E1031 01:07:34.622624 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.622797 kubelet[1444]: E1031 01:07:34.622789 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.622797 kubelet[1444]: W1031 01:07:34.622796 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.622845 kubelet[1444]: E1031 01:07:34.622807 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.622993 kubelet[1444]: E1031 01:07:34.622968 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.622993 kubelet[1444]: W1031 01:07:34.622986 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.623069 kubelet[1444]: E1031 01:07:34.623001 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.623166 kubelet[1444]: E1031 01:07:34.623146 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.623166 kubelet[1444]: W1031 01:07:34.623155 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.623166 kubelet[1444]: E1031 01:07:34.623165 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.623373 kubelet[1444]: E1031 01:07:34.623358 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.623373 kubelet[1444]: W1031 01:07:34.623367 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.623463 kubelet[1444]: E1031 01:07:34.623380 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.623554 kubelet[1444]: E1031 01:07:34.623544 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.623554 kubelet[1444]: W1031 01:07:34.623551 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.623598 kubelet[1444]: E1031 01:07:34.623570 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.623797 kubelet[1444]: E1031 01:07:34.623785 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.623797 kubelet[1444]: W1031 01:07:34.623797 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.623856 kubelet[1444]: E1031 01:07:34.623811 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.623979 kubelet[1444]: E1031 01:07:34.623962 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.623979 kubelet[1444]: W1031 01:07:34.623973 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.624023 kubelet[1444]: E1031 01:07:34.623986 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.624147 kubelet[1444]: E1031 01:07:34.624121 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.624147 kubelet[1444]: W1031 01:07:34.624146 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.624217 kubelet[1444]: E1031 01:07:34.624159 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.624319 kubelet[1444]: E1031 01:07:34.624302 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.624319 kubelet[1444]: W1031 01:07:34.624314 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.624383 kubelet[1444]: E1031 01:07:34.624328 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.624512 kubelet[1444]: E1031 01:07:34.624496 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.624512 kubelet[1444]: W1031 01:07:34.624507 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.624603 kubelet[1444]: E1031 01:07:34.624518 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.624810 kubelet[1444]: E1031 01:07:34.624796 1444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 01:07:34.624810 kubelet[1444]: W1031 01:07:34.624808 1444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 01:07:34.624875 kubelet[1444]: E1031 01:07:34.624817 1444 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 01:07:34.837680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount211856670.mount: Deactivated successfully. Oct 31 01:07:34.977717 env[1209]: time="2025-10-31T01:07:34.977660538Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:34.979447 env[1209]: time="2025-10-31T01:07:34.979411892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:34.981073 env[1209]: time="2025-10-31T01:07:34.981039815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:34.982488 env[1209]: time="2025-10-31T01:07:34.982437016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:34.982885 env[1209]: time="2025-10-31T01:07:34.982850261Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 01:07:34.984897 env[1209]: time="2025-10-31T01:07:34.984861893Z" level=info msg="CreateContainer within sandbox \"164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 01:07:35.000265 env[1209]: time="2025-10-31T01:07:35.000214825Z" level=info msg="CreateContainer within sandbox \"164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307\"" Oct 31 01:07:35.000743 env[1209]: time="2025-10-31T01:07:35.000703522Z" level=info msg="StartContainer for \"edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307\"" Oct 31 01:07:35.032586 systemd[1]: Started cri-containerd-edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307.scope. Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbbc0d11d58 items=0 ppid=1543 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:35.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663335356265613830326333646130633362666164353161313137 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit: BPF prog-id=66 op=LOAD Oct 31 01:07:35.081000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038fc58 items=0 ppid=1543 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:35.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663335356265613830326333646130633362666164353161313137 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit: BPF prog-id=67 op=LOAD Oct 31 01:07:35.081000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038fca8 items=0 ppid=1543 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:35.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663335356265613830326333646130633362666164353161313137 Oct 31 01:07:35.081000 audit: BPF prog-id=67 op=UNLOAD Oct 31 01:07:35.081000 audit: BPF prog-id=66 op=UNLOAD Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:35.081000 audit: BPF prog-id=68 op=LOAD Oct 31 01:07:35.081000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038fd38 items=0 ppid=1543 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:35.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564663335356265613830326333646130633362666164353161313137 Oct 31 01:07:35.096410 env[1209]: time="2025-10-31T01:07:35.096291784Z" level=info msg="StartContainer for \"edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307\" returns successfully" Oct 31 01:07:35.103549 systemd[1]: cri-containerd-edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307.scope: Deactivated successfully. Oct 31 01:07:35.110000 audit: BPF prog-id=68 op=UNLOAD Oct 31 01:07:35.543500 kubelet[1444]: E1031 01:07:35.543458 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:35.543500 kubelet[1444]: E1031 01:07:35.543487 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:35.581654 kubelet[1444]: E1031 01:07:35.581592 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:35.792478 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307-rootfs.mount: Deactivated successfully. Oct 31 01:07:36.300181 env[1209]: time="2025-10-31T01:07:36.300124751Z" level=info msg="shim disconnected" id=edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307 Oct 31 01:07:36.300181 env[1209]: time="2025-10-31T01:07:36.300176467Z" level=warning msg="cleaning up after shim disconnected" id=edf355bea802c3da0c3bfad51a11712124f3dbaf1c207d1e5f6bb3a071df0307 namespace=k8s.io Oct 31 01:07:36.300181 env[1209]: time="2025-10-31T01:07:36.300185264Z" level=info msg="cleaning up dead shim" Oct 31 01:07:36.309405 env[1209]: time="2025-10-31T01:07:36.309347837Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:07:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1858 runtime=io.containerd.runc.v2\n" Oct 31 01:07:36.517005 kubelet[1444]: E1031 01:07:36.516919 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:36.545897 kubelet[1444]: E1031 01:07:36.545856 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:36.546600 env[1209]: time="2025-10-31T01:07:36.546565325Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 01:07:36.582265 kubelet[1444]: E1031 01:07:36.582060 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:37.582696 kubelet[1444]: E1031 01:07:37.582580 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:38.517127 kubelet[1444]: E1031 01:07:38.517081 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:38.583307 kubelet[1444]: E1031 01:07:38.583268 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:39.583748 kubelet[1444]: E1031 01:07:39.583672 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:40.516747 kubelet[1444]: E1031 01:07:40.516677 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:40.584554 kubelet[1444]: E1031 01:07:40.584466 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:40.989052 env[1209]: time="2025-10-31T01:07:40.988982052Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:40.993484 env[1209]: time="2025-10-31T01:07:40.993429202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:40.995287 env[1209]: time="2025-10-31T01:07:40.995254425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:40.997716 env[1209]: time="2025-10-31T01:07:40.997659365Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:40.998460 env[1209]: time="2025-10-31T01:07:40.998413649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 01:07:41.001663 env[1209]: time="2025-10-31T01:07:41.001605014Z" level=info msg="CreateContainer within sandbox \"164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 01:07:41.021953 env[1209]: time="2025-10-31T01:07:41.021877332Z" level=info msg="CreateContainer within sandbox \"164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921\"" Oct 31 01:07:41.022433 env[1209]: time="2025-10-31T01:07:41.022400954Z" level=info msg="StartContainer for \"297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921\"" Oct 31 01:07:41.041329 systemd[1]: Started cri-containerd-297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921.scope. Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.150533 kernel: kauditd_printk_skb: 230 callbacks suppressed Oct 31 01:07:41.150596 kernel: audit: type=1400 audit(1761872861.148:507): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f6877fc3698 items=0 ppid=1543 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:41.164592 kernel: audit: type=1300 audit(1761872861.148:507): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f6877fc3698 items=0 ppid=1543 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:41.164741 kernel: audit: type=1327 audit(1761872861.148:507): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239376663323337636139666531663834316139633562346665303964 Oct 31 01:07:41.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239376663323337636139666531663834316139633562346665303964 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.177462 kernel: audit: type=1400 audit(1761872861.148:508): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.177527 kernel: audit: type=1400 audit(1761872861.148:508): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.188650 kernel: audit: type=1400 audit(1761872861.148:508): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.192831 kernel: audit: type=1400 audit(1761872861.148:508): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.193678 kernel: audit: type=1400 audit(1761872861.148:508): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.200257 env[1209]: time="2025-10-31T01:07:41.200190773Z" level=info msg="StartContainer for \"297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921\" returns successfully" Oct 31 01:07:41.205657 kernel: audit: type=1400 audit(1761872861.148:508): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.205813 kernel: audit: type=1400 audit(1761872861.148:508): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.148000 audit: BPF prog-id=69 op=LOAD Oct 31 01:07:41.148000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0003ce2e8 items=0 ppid=1543 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:41.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239376663323337636139666531663834316139633562346665303964 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.155000 audit: BPF prog-id=70 op=LOAD Oct 31 01:07:41.155000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0003ce338 items=0 ppid=1543 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:41.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239376663323337636139666531663834316139633562346665303964 Oct 31 01:07:41.164000 audit: BPF prog-id=70 op=UNLOAD Oct 31 01:07:41.164000 audit: BPF prog-id=69 op=UNLOAD Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:41.164000 audit: BPF prog-id=71 op=LOAD Oct 31 01:07:41.164000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0003ce3c8 items=0 ppid=1543 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:41.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239376663323337636139666531663834316139633562346665303964 Oct 31 01:07:41.556543 kubelet[1444]: E1031 01:07:41.556497 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:41.584860 kubelet[1444]: E1031 01:07:41.584806 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:42.517418 kubelet[1444]: E1031 01:07:42.517342 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:42.557442 kubelet[1444]: E1031 01:07:42.557396 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:42.585459 kubelet[1444]: E1031 01:07:42.585382 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:42.744607 env[1209]: time="2025-10-31T01:07:42.744460460Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 01:07:42.746265 systemd[1]: cri-containerd-297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921.scope: Deactivated successfully. Oct 31 01:07:42.746547 systemd[1]: cri-containerd-297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921.scope: Consumed 1.233s CPU time. Oct 31 01:07:42.752000 audit: BPF prog-id=71 op=UNLOAD Oct 31 01:07:42.757757 kubelet[1444]: I1031 01:07:42.757686 1444 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 31 01:07:42.773739 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921-rootfs.mount: Deactivated successfully. Oct 31 01:07:43.585840 kubelet[1444]: E1031 01:07:43.585762 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:43.685452 env[1209]: time="2025-10-31T01:07:43.685395579Z" level=info msg="shim disconnected" id=297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921 Oct 31 01:07:43.685452 env[1209]: time="2025-10-31T01:07:43.685450933Z" level=warning msg="cleaning up after shim disconnected" id=297fc237ca9fe1f841a9c5b4fe09db0e1f90876a707f97a88567390bd70e3921 namespace=k8s.io Oct 31 01:07:43.685452 env[1209]: time="2025-10-31T01:07:43.685463276Z" level=info msg="cleaning up dead shim" Oct 31 01:07:43.699409 env[1209]: time="2025-10-31T01:07:43.699343236Z" level=warning msg="cleanup warnings time=\"2025-10-31T01:07:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1917 runtime=io.containerd.runc.v2\n" Oct 31 01:07:44.522583 systemd[1]: Created slice kubepods-besteffort-pod329a10ac_4edf_49f3_88c8_aa1c4184c6de.slice. Oct 31 01:07:44.524770 env[1209]: time="2025-10-31T01:07:44.524716225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8wv96,Uid:329a10ac-4edf-49f3-88c8-aa1c4184c6de,Namespace:calico-system,Attempt:0,}" Oct 31 01:07:44.563623 kubelet[1444]: E1031 01:07:44.563572 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:44.564984 env[1209]: time="2025-10-31T01:07:44.564943335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 01:07:44.572783 kubelet[1444]: E1031 01:07:44.572697 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:44.586716 kubelet[1444]: E1031 01:07:44.586646 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:44.595576 env[1209]: time="2025-10-31T01:07:44.595480714Z" level=error msg="Failed to destroy network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:44.595965 env[1209]: time="2025-10-31T01:07:44.595922262Z" level=error msg="encountered an error cleaning up failed sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:44.596028 env[1209]: time="2025-10-31T01:07:44.595995419Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8wv96,Uid:329a10ac-4edf-49f3-88c8-aa1c4184c6de,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:44.596364 kubelet[1444]: E1031 01:07:44.596282 1444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:44.596529 kubelet[1444]: E1031 01:07:44.596391 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8wv96" Oct 31 01:07:44.596529 kubelet[1444]: E1031 01:07:44.596425 1444 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8wv96" Oct 31 01:07:44.596529 kubelet[1444]: E1031 01:07:44.596484 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8wv96_calico-system(329a10ac-4edf-49f3-88c8-aa1c4184c6de)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8wv96_calico-system(329a10ac-4edf-49f3-88c8-aa1c4184c6de)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:44.597266 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf-shm.mount: Deactivated successfully. Oct 31 01:07:45.566395 kubelet[1444]: I1031 01:07:45.566339 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:07:45.567345 env[1209]: time="2025-10-31T01:07:45.567283236Z" level=info msg="StopPodSandbox for \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\"" Oct 31 01:07:45.587532 kubelet[1444]: E1031 01:07:45.587483 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:45.589343 env[1209]: time="2025-10-31T01:07:45.589283405Z" level=error msg="StopPodSandbox for \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\" failed" error="failed to destroy network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:45.589648 kubelet[1444]: E1031 01:07:45.589572 1444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:07:45.589791 kubelet[1444]: E1031 01:07:45.589690 1444 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf"} Oct 31 01:07:45.589873 kubelet[1444]: E1031 01:07:45.589821 1444 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"329a10ac-4edf-49f3-88c8-aa1c4184c6de\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:07:45.589986 kubelet[1444]: E1031 01:07:45.589874 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"329a10ac-4edf-49f3-88c8-aa1c4184c6de\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:07:46.588757 kubelet[1444]: E1031 01:07:46.588663 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:47.589958 kubelet[1444]: E1031 01:07:47.589853 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:47.720013 systemd[1]: Created slice kubepods-besteffort-pod7d0bdec2_50e1_48ea_8509_63b518aaf340.slice. Oct 31 01:07:47.818978 kubelet[1444]: I1031 01:07:47.818913 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jj7vg\" (UniqueName: \"kubernetes.io/projected/7d0bdec2-50e1-48ea-8509-63b518aaf340-kube-api-access-jj7vg\") pod \"nginx-deployment-7fcdb87857-84rfq\" (UID: \"7d0bdec2-50e1-48ea-8509-63b518aaf340\") " pod="default/nginx-deployment-7fcdb87857-84rfq" Oct 31 01:07:48.023982 env[1209]: time="2025-10-31T01:07:48.023874713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-84rfq,Uid:7d0bdec2-50e1-48ea-8509-63b518aaf340,Namespace:default,Attempt:0,}" Oct 31 01:07:48.590484 kubelet[1444]: E1031 01:07:48.590367 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:48.886655 env[1209]: time="2025-10-31T01:07:48.886465464Z" level=error msg="Failed to destroy network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:48.888361 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127-shm.mount: Deactivated successfully. Oct 31 01:07:48.889310 env[1209]: time="2025-10-31T01:07:48.889254240Z" level=error msg="encountered an error cleaning up failed sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:48.889579 env[1209]: time="2025-10-31T01:07:48.889525021Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-84rfq,Uid:7d0bdec2-50e1-48ea-8509-63b518aaf340,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:48.890016 kubelet[1444]: E1031 01:07:48.889947 1444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:48.890135 kubelet[1444]: E1031 01:07:48.890053 1444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-84rfq" Oct 31 01:07:48.890135 kubelet[1444]: E1031 01:07:48.890107 1444 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-84rfq" Oct 31 01:07:48.890229 kubelet[1444]: E1031 01:07:48.890173 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-84rfq_default(7d0bdec2-50e1-48ea-8509-63b518aaf340)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-84rfq_default(7d0bdec2-50e1-48ea-8509-63b518aaf340)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-84rfq" podUID="7d0bdec2-50e1-48ea-8509-63b518aaf340" Oct 31 01:07:49.575433 kubelet[1444]: I1031 01:07:49.575371 1444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:07:49.576164 env[1209]: time="2025-10-31T01:07:49.576080862Z" level=info msg="StopPodSandbox for \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\"" Oct 31 01:07:49.591336 kubelet[1444]: E1031 01:07:49.591261 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:49.648885 env[1209]: time="2025-10-31T01:07:49.648772775Z" level=error msg="StopPodSandbox for \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\" failed" error="failed to destroy network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 01:07:49.649255 kubelet[1444]: E1031 01:07:49.649180 1444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:07:49.649370 kubelet[1444]: E1031 01:07:49.649276 1444 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127"} Oct 31 01:07:49.649370 kubelet[1444]: E1031 01:07:49.649331 1444 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7d0bdec2-50e1-48ea-8509-63b518aaf340\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 01:07:49.649579 kubelet[1444]: E1031 01:07:49.649372 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7d0bdec2-50e1-48ea-8509-63b518aaf340\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-84rfq" podUID="7d0bdec2-50e1-48ea-8509-63b518aaf340" Oct 31 01:07:50.591508 kubelet[1444]: E1031 01:07:50.591424 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:51.591770 kubelet[1444]: E1031 01:07:51.591695 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:52.592395 kubelet[1444]: E1031 01:07:52.592339 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:53.592836 kubelet[1444]: E1031 01:07:53.592761 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:54.593131 kubelet[1444]: E1031 01:07:54.593089 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:54.757651 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount939384104.mount: Deactivated successfully. Oct 31 01:07:55.581824 env[1209]: time="2025-10-31T01:07:55.581752353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:55.590851 env[1209]: time="2025-10-31T01:07:55.590798537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:55.593476 env[1209]: time="2025-10-31T01:07:55.593444878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:55.593800 kubelet[1444]: E1031 01:07:55.593760 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:55.595761 env[1209]: time="2025-10-31T01:07:55.595714780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:07:55.596356 env[1209]: time="2025-10-31T01:07:55.596325596Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 01:07:55.621488 env[1209]: time="2025-10-31T01:07:55.621434938Z" level=info msg="CreateContainer within sandbox \"164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 01:07:55.640751 env[1209]: time="2025-10-31T01:07:55.640671831Z" level=info msg="CreateContainer within sandbox \"164f34cc62032c7a7e0c88e1e20c5277dbd34d2d139d4e59575fbee6aa33f338\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1187da5f8257fb2b646961b5a2d7a41e308aa426fdba8b5d8d6f90e1259b6192\"" Oct 31 01:07:55.641621 env[1209]: time="2025-10-31T01:07:55.641579223Z" level=info msg="StartContainer for \"1187da5f8257fb2b646961b5a2d7a41e308aa426fdba8b5d8d6f90e1259b6192\"" Oct 31 01:07:55.663966 systemd[1]: Started cri-containerd-1187da5f8257fb2b646961b5a2d7a41e308aa426fdba8b5d8d6f90e1259b6192.scope. Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.726338 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 01:07:55.726409 kernel: audit: type=1400 audit(1761872875.722:514): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f56bb0e56b8 items=0 ppid=1543 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:55.743310 kernel: audit: type=1300 audit(1761872875.722:514): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f56bb0e56b8 items=0 ppid=1543 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:55.743433 kernel: audit: type=1327 audit(1761872875.722:514): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383764613566383235376662326236343639363162356132643761 Oct 31 01:07:55.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383764613566383235376662326236343639363162356132643761 Oct 31 01:07:55.751965 kernel: audit: type=1400 audit(1761872875.722:515): avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.759802 kernel: audit: type=1400 audit(1761872875.722:515): avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.769549 kernel: audit: type=1400 audit(1761872875.722:515): avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.781140 kernel: audit: type=1400 audit(1761872875.722:515): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.781229 kernel: audit: type=1400 audit(1761872875.722:515): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.781254 kernel: audit: type=1400 audit(1761872875.722:515): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.793618 kernel: audit: type=1400 audit(1761872875.722:515): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.722000 audit: BPF prog-id=72 op=LOAD Oct 31 01:07:55.722000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000ebe78 items=0 ppid=1543 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:55.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383764613566383235376662326236343639363162356132643761 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.731000 audit: BPF prog-id=73 op=LOAD Oct 31 01:07:55.731000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000ebec8 items=0 ppid=1543 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:55.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383764613566383235376662326236343639363162356132643761 Oct 31 01:07:55.741000 audit: BPF prog-id=73 op=UNLOAD Oct 31 01:07:55.741000 audit: BPF prog-id=72 op=UNLOAD Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:55.741000 audit: BPF prog-id=74 op=LOAD Oct 31 01:07:55.741000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000ebf58 items=0 ppid=1543 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:55.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131383764613566383235376662326236343639363162356132643761 Oct 31 01:07:55.811610 env[1209]: time="2025-10-31T01:07:55.811462847Z" level=info msg="StartContainer for \"1187da5f8257fb2b646961b5a2d7a41e308aa426fdba8b5d8d6f90e1259b6192\" returns successfully" Oct 31 01:07:55.917181 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 01:07:55.917343 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 01:07:56.591695 kubelet[1444]: E1031 01:07:56.591658 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:56.594062 kubelet[1444]: E1031 01:07:56.594012 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:56.608340 kubelet[1444]: I1031 01:07:56.608238 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vzg8s" podStartSLOduration=4.495385384 podStartE2EDuration="31.608208998s" podCreationTimestamp="2025-10-31 01:07:25 +0000 UTC" firstStartedPulling="2025-10-31 01:07:28.484425755 +0000 UTC m=+4.230615505" lastFinishedPulling="2025-10-31 01:07:55.597249369 +0000 UTC m=+31.343439119" observedRunningTime="2025-10-31 01:07:56.608191955 +0000 UTC m=+32.354381705" watchObservedRunningTime="2025-10-31 01:07:56.608208998 +0000 UTC m=+32.354398738" Oct 31 01:07:57.144000 audit[2152]: AVC avc: denied { write } for pid=2152 comm="tee" name="fd" dev="proc" ino=19149 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:07:57.144000 audit[2152]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9090f7ef a2=241 a3=1b6 items=1 ppid=2131 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.144000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 01:07:57.144000 audit: PATH item=0 name="/dev/fd/63" inode=19136 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:57.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:07:57.158000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=19953 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:07:57.158000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc66c9c7dd a2=241 a3=1b6 items=1 ppid=2130 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.158000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 01:07:57.159000 audit[2166]: AVC avc: denied { write } for pid=2166 comm="tee" name="fd" dev="proc" ino=19157 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:07:57.159000 audit[2166]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff85b587ed a2=241 a3=1b6 items=1 ppid=2137 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.159000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 01:07:57.159000 audit: PATH item=0 name="/dev/fd/63" inode=20797 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:57.159000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:07:57.158000 audit: PATH item=0 name="/dev/fd/63" inode=19945 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:57.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:07:57.161000 audit[2179]: AVC avc: denied { write } for pid=2179 comm="tee" name="fd" dev="proc" ino=19957 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:07:57.162000 audit[2185]: AVC avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=20804 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:07:57.161000 audit[2179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd315557de a2=241 a3=1b6 items=1 ppid=2136 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.161000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 01:07:57.161000 audit: PATH item=0 name="/dev/fd/63" inode=19950 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:57.161000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:07:57.162000 audit[2185]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdef44d7ed a2=241 a3=1b6 items=1 ppid=2144 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.162000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 01:07:57.162000 audit: PATH item=0 name="/dev/fd/63" inode=20801 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:57.162000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:07:57.170000 audit[2201]: AVC avc: denied { write } for pid=2201 comm="tee" name="fd" dev="proc" ino=18318 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:07:57.173000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=20808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 01:07:57.173000 audit[2193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc18e4a7ed a2=241 a3=1b6 items=1 ppid=2134 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.173000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 01:07:57.173000 audit: PATH item=0 name="/dev/fd/63" inode=18314 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:57.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:07:57.170000 audit[2201]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0253e7ee a2=241 a3=1b6 items=1 ppid=2149 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.170000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 01:07:57.170000 audit: PATH item=0 name="/dev/fd/63" inode=19959 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:07:57.170000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit: BPF prog-id=75 op=LOAD Oct 31 01:07:57.363000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff428b1cf0 a2=98 a3=1fffffffffffffff items=0 ppid=2145 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.363000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:07:57.363000 audit: BPF prog-id=75 op=UNLOAD Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit: BPF prog-id=76 op=LOAD Oct 31 01:07:57.363000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff428b1bd0 a2=94 a3=3 items=0 ppid=2145 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.363000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:07:57.363000 audit: BPF prog-id=76 op=UNLOAD Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { bpf } for pid=2250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit: BPF prog-id=77 op=LOAD Oct 31 01:07:57.363000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff428b1c10 a2=94 a3=7fff428b1df0 items=0 ppid=2145 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.363000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:07:57.363000 audit: BPF prog-id=77 op=UNLOAD Oct 31 01:07:57.363000 audit[2250]: AVC avc: denied { perfmon } for pid=2250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.363000 audit[2250]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff428b1ce0 a2=50 a3=a000000085 items=0 ppid=2145 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.363000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.366000 audit: BPF prog-id=78 op=LOAD Oct 31 01:07:57.366000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd4b9105c0 a2=98 a3=3 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.366000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.366000 audit: BPF prog-id=78 op=UNLOAD Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit: BPF prog-id=79 op=LOAD Oct 31 01:07:57.367000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4b9103b0 a2=94 a3=54428f items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.367000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.367000 audit: BPF prog-id=79 op=UNLOAD Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.367000 audit: BPF prog-id=80 op=LOAD Oct 31 01:07:57.367000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4b9103e0 a2=94 a3=2 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.367000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.367000 audit: BPF prog-id=80 op=UNLOAD Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.485000 audit: BPF prog-id=81 op=LOAD Oct 31 01:07:57.485000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4b9102a0 a2=94 a3=1 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.485000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.486000 audit: BPF prog-id=81 op=UNLOAD Oct 31 01:07:57.486000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.486000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd4b910370 a2=50 a3=7ffd4b910450 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.486000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4b9102b0 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4b9102e0 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4b9101f0 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4b910300 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4b9102e0 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4b9102d0 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4b910300 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4b9102e0 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4b910300 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4b9102d0 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4b910340 a2=28 a3=0 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4b9100f0 a2=50 a3=1 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit: BPF prog-id=82 op=LOAD Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd4b9100f0 a2=94 a3=5 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit: BPF prog-id=82 op=UNLOAD Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4b9101a0 a2=50 a3=1 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd4b9102c0 a2=4 a3=38 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.495000 audit[2251]: AVC avc: denied { confidentiality } for pid=2251 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:07:57.495000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4b910310 a2=94 a3=6 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { confidentiality } for pid=2251 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:07:57.496000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4b90fac0 a2=94 a3=88 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.496000 audit[2251]: AVC avc: denied { confidentiality } for pid=2251 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:07:57.496000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4b90fac0 a2=94 a3=88 items=0 ppid=2145 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit: BPF prog-id=83 op=LOAD Oct 31 01:07:57.507000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe943f4140 a2=98 a3=1999999999999999 items=0 ppid=2145 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.507000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:07:57.507000 audit: BPF prog-id=83 op=UNLOAD Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit: BPF prog-id=84 op=LOAD Oct 31 01:07:57.507000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe943f4020 a2=94 a3=ffff items=0 ppid=2145 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.507000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:07:57.507000 audit: BPF prog-id=84 op=UNLOAD Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { perfmon } for pid=2254 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit[2254]: AVC avc: denied { bpf } for pid=2254 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.507000 audit: BPF prog-id=85 op=LOAD Oct 31 01:07:57.507000 audit[2254]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe943f4060 a2=94 a3=7ffe943f4240 items=0 ppid=2145 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.507000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 01:07:57.507000 audit: BPF prog-id=85 op=UNLOAD Oct 31 01:07:57.579948 systemd-networkd[1027]: vxlan.calico: Link UP Oct 31 01:07:57.579958 systemd-networkd[1027]: vxlan.calico: Gained carrier Oct 31 01:07:57.593398 kubelet[1444]: E1031 01:07:57.593368 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:07:57.594597 kubelet[1444]: E1031 01:07:57.594553 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.598000 audit: BPF prog-id=86 op=LOAD Oct 31 01:07:57.598000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf731fd10 a2=98 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.598000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit: BPF prog-id=86 op=UNLOAD Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit: BPF prog-id=87 op=LOAD Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf731fb20 a2=94 a3=54428f items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit: BPF prog-id=87 op=UNLOAD Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit: BPF prog-id=88 op=LOAD Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf731fb50 a2=94 a3=2 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit: BPF prog-id=88 op=UNLOAD Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf731fa20 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf731fa50 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf731f960 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf731fa70 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf731fa50 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf731fa40 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf731fa70 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf731fa50 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf731fa70 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.599000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.599000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf731fa40 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.599000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf731fab0 a2=28 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit: BPF prog-id=89 op=LOAD Oct 31 01:07:57.600000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf731f920 a2=94 a3=0 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.600000 audit: BPF prog-id=89 op=UNLOAD Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdf731f910 a2=50 a3=2800 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdf731f910 a2=50 a3=2800 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit: BPF prog-id=90 op=LOAD Oct 31 01:07:57.600000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf731f130 a2=94 a3=2 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.600000 audit: BPF prog-id=90 op=UNLOAD Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.600000 audit: BPF prog-id=91 op=LOAD Oct 31 01:07:57.600000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf731f230 a2=94 a3=30 items=0 ppid=2145 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit: BPF prog-id=92 op=LOAD Oct 31 01:07:57.606000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffceb9e6710 a2=98 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.606000 audit: BPF prog-id=92 op=UNLOAD Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit: BPF prog-id=93 op=LOAD Oct 31 01:07:57.606000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffceb9e6500 a2=94 a3=54428f items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.606000 audit: BPF prog-id=93 op=UNLOAD Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.606000 audit: BPF prog-id=94 op=LOAD Oct 31 01:07:57.606000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffceb9e6530 a2=94 a3=2 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.606000 audit: BPF prog-id=94 op=UNLOAD Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit: BPF prog-id=95 op=LOAD Oct 31 01:07:57.728000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffceb9e63f0 a2=94 a3=1 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.728000 audit: BPF prog-id=95 op=UNLOAD Oct 31 01:07:57.728000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.728000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffceb9e64c0 a2=50 a3=7ffceb9e65a0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceb9e6400 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceb9e6430 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceb9e6340 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceb9e6450 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceb9e6430 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceb9e6420 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceb9e6450 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceb9e6430 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceb9e6450 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffceb9e6420 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffceb9e6490 a2=28 a3=0 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffceb9e6240 a2=50 a3=1 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit: BPF prog-id=96 op=LOAD Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffceb9e6240 a2=94 a3=5 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit: BPF prog-id=96 op=UNLOAD Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffceb9e62f0 a2=50 a3=1 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffceb9e6410 a2=4 a3=38 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { confidentiality } for pid=2295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffceb9e6460 a2=94 a3=6 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.737000 audit[2295]: AVC avc: denied { confidentiality } for pid=2295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:07:57.737000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffceb9e5c10 a2=94 a3=88 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { confidentiality } for pid=2295 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:07:57.738000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffceb9e5c10 a2=94 a3=88 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffceb9e7640 a2=10 a3=208 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffceb9e74e0 a2=10 a3=3 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffceb9e7480 a2=10 a3=3 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.738000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:07:57.738000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffceb9e7480 a2=10 a3=7 items=0 ppid=2145 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 01:07:57.745000 audit: BPF prog-id=91 op=UNLOAD Oct 31 01:07:57.821000 audit[2335]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:07:57.821000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd66e91d20 a2=0 a3=7ffd66e91d0c items=0 ppid=2145 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.821000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:07:57.825000 audit[2333]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:07:57.825000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc94fa54e0 a2=0 a3=7ffc94fa54cc items=0 ppid=2145 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.825000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:07:57.828000 audit[2338]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:07:57.828000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc0068e980 a2=0 a3=7ffc0068e96c items=0 ppid=2145 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.828000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:07:57.830000 audit[2334]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:07:57.830000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffce1644890 a2=0 a3=7ffce164487c items=0 ppid=2145 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:07:57.830000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:07:58.026563 update_engine[1201]: I1031 01:07:58.026369 1201 update_attempter.cc:509] Updating boot flags... Oct 31 01:07:58.594742 kubelet[1444]: E1031 01:07:58.594669 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:07:59.498061 systemd-networkd[1027]: vxlan.calico: Gained IPv6LL Oct 31 01:07:59.595090 kubelet[1444]: E1031 01:07:59.595020 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:00.517503 env[1209]: time="2025-10-31T01:08:00.517441074Z" level=info msg="StopPodSandbox for \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\"" Oct 31 01:08:00.595915 kubelet[1444]: E1031 01:08:00.595862 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.566 [INFO][2363] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.566 [INFO][2363] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" iface="eth0" netns="/var/run/netns/cni-25fe700c-5a43-7cf0-a9f9-2ed37dff7261" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.566 [INFO][2363] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" iface="eth0" netns="/var/run/netns/cni-25fe700c-5a43-7cf0-a9f9-2ed37dff7261" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.567 [INFO][2363] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" iface="eth0" netns="/var/run/netns/cni-25fe700c-5a43-7cf0-a9f9-2ed37dff7261" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.567 [INFO][2363] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.567 [INFO][2363] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.587 [INFO][2372] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.587 [INFO][2372] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.588 [INFO][2372] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.596 [WARNING][2372] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.596 [INFO][2372] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.598 [INFO][2372] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:00.603604 env[1209]: 2025-10-31 01:08:00.601 [INFO][2363] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:00.604190 env[1209]: time="2025-10-31T01:08:00.603866378Z" level=info msg="TearDown network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\" successfully" Oct 31 01:08:00.604190 env[1209]: time="2025-10-31T01:08:00.603911343Z" level=info msg="StopPodSandbox for \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\" returns successfully" Oct 31 01:08:00.604904 env[1209]: time="2025-10-31T01:08:00.604863652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8wv96,Uid:329a10ac-4edf-49f3-88c8-aa1c4184c6de,Namespace:calico-system,Attempt:1,}" Oct 31 01:08:00.605709 systemd[1]: run-netns-cni\x2d25fe700c\x2d5a43\x2d7cf0\x2da9f9\x2d2ed37dff7261.mount: Deactivated successfully. Oct 31 01:08:00.721962 systemd-networkd[1027]: cali7ab9a2ea71b: Link UP Oct 31 01:08:00.725979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:08:00.726046 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7ab9a2ea71b: link becomes ready Oct 31 01:08:00.726135 systemd-networkd[1027]: cali7ab9a2ea71b: Gained carrier Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.657 [INFO][2381] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-csi--node--driver--8wv96-eth0 csi-node-driver- calico-system 329a10ac-4edf-49f3-88c8-aa1c4184c6de 1380 0 2025-10-31 01:07:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.30 csi-node-driver-8wv96 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali7ab9a2ea71b [] [] }} ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.657 [INFO][2381] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.679 [INFO][2395] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" HandleID="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.679 [INFO][2395] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" HandleID="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000139640), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.30", "pod":"csi-node-driver-8wv96", "timestamp":"2025-10-31 01:08:00.679705984 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.679 [INFO][2395] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.679 [INFO][2395] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.679 [INFO][2395] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.689 [INFO][2395] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.694 [INFO][2395] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.700 [INFO][2395] ipam/ipam.go 511: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.702 [INFO][2395] ipam/ipam.go 158: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.704 [INFO][2395] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.704 [INFO][2395] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.706 [INFO][2395] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34 Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.711 [INFO][2395] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.717 [INFO][2395] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.125.1/26] block=192.168.125.0/26 handle="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.717 [INFO][2395] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.125.1/26] handle="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" host="10.0.0.30" Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.717 [INFO][2395] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:00.739226 env[1209]: 2025-10-31 01:08:00.717 [INFO][2395] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.125.1/26] IPv6=[] ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" HandleID="k8s-pod-network.e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.740437 env[1209]: 2025-10-31 01:08:00.719 [INFO][2381] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-csi--node--driver--8wv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"329a10ac-4edf-49f3-88c8-aa1c4184c6de", ResourceVersion:"1380", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"csi-node-driver-8wv96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7ab9a2ea71b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:00.740437 env[1209]: 2025-10-31 01:08:00.719 [INFO][2381] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.125.1/32] ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.740437 env[1209]: 2025-10-31 01:08:00.719 [INFO][2381] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7ab9a2ea71b ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.740437 env[1209]: 2025-10-31 01:08:00.726 [INFO][2381] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.740437 env[1209]: 2025-10-31 01:08:00.727 [INFO][2381] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-csi--node--driver--8wv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"329a10ac-4edf-49f3-88c8-aa1c4184c6de", ResourceVersion:"1380", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34", Pod:"csi-node-driver-8wv96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7ab9a2ea71b", MAC:"6a:ba:77:80:6e:af", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:00.740437 env[1209]: 2025-10-31 01:08:00.737 [INFO][2381] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34" Namespace="calico-system" Pod="csi-node-driver-8wv96" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:00.750172 env[1209]: time="2025-10-31T01:08:00.750086242Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:08:00.750172 env[1209]: time="2025-10-31T01:08:00.750142028Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:08:00.750409 env[1209]: time="2025-10-31T01:08:00.750154863Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:08:00.750707 env[1209]: time="2025-10-31T01:08:00.750668188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34 pid=2420 runtime=io.containerd.runc.v2 Oct 31 01:08:00.767347 systemd[1]: Started cri-containerd-e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34.scope. Oct 31 01:08:00.785268 kernel: kauditd_printk_skb: 590 callbacks suppressed Oct 31 01:08:00.785461 kernel: audit: type=1325 audit(1761872880.754:629): table=filter:69 family=2 entries=38 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:08:00.785489 kernel: audit: type=1300 audit(1761872880.754:629): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffefcc51e50 a2=0 a3=7ffefcc51e3c items=0 ppid=2145 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:00.754000 audit[2421]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:08:00.754000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffefcc51e50 a2=0 a3=7ffefcc51e3c items=0 ppid=2145 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:00.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:08:00.792874 kernel: audit: type=1327 audit(1761872880.754:629): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:08:00.793008 kernel: audit: type=1400 audit(1761872880.779:630): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.803148 kernel: audit: type=1400 audit(1761872880.779:631): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.803189 kernel: audit: type=1400 audit(1761872880.779:632): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.813613 kernel: audit: type=1400 audit(1761872880.779:633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.813790 kernel: audit: type=1400 audit(1761872880.779:634): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.818926 kernel: audit: type=1400 audit(1761872880.779:635): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.824264 kernel: audit: type=1400 audit(1761872880.779:636): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.824507 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit: BPF prog-id=97 op=LOAD Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2420 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:00.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633461636431386332373339613831616333663136616534396331 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2420 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:00.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633461636431386332373339613831616333663136616534396331 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.787000 audit: BPF prog-id=98 op=LOAD Oct 31 01:08:00.787000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000099690 items=0 ppid=2420 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:00.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633461636431386332373339613831616333663136616534396331 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.797000 audit: BPF prog-id=99 op=LOAD Oct 31 01:08:00.797000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000996d8 items=0 ppid=2420 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:00.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633461636431386332373339613831616333663136616534396331 Oct 31 01:08:00.808000 audit: BPF prog-id=99 op=UNLOAD Oct 31 01:08:00.808000 audit: BPF prog-id=98 op=UNLOAD Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:00.808000 audit: BPF prog-id=100 op=LOAD Oct 31 01:08:00.808000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000099ae8 items=0 ppid=2420 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:00.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633461636431386332373339613831616333663136616534396331 Oct 31 01:08:00.839921 env[1209]: time="2025-10-31T01:08:00.839868842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8wv96,Uid:329a10ac-4edf-49f3-88c8-aa1c4184c6de,Namespace:calico-system,Attempt:1,} returns sandbox id \"e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34\"" Oct 31 01:08:00.842489 env[1209]: time="2025-10-31T01:08:00.842435587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:08:01.234542 env[1209]: time="2025-10-31T01:08:01.234459926Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:08:01.236292 env[1209]: time="2025-10-31T01:08:01.236204638Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:08:01.236611 kubelet[1444]: E1031 01:08:01.236553 1444 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:08:01.236688 kubelet[1444]: E1031 01:08:01.236626 1444 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:08:01.236891 kubelet[1444]: E1031 01:08:01.236841 1444 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-7nphb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-8wv96_calico-system(329a10ac-4edf-49f3-88c8-aa1c4184c6de): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:08:01.239067 env[1209]: time="2025-10-31T01:08:01.239030570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:08:01.567621 env[1209]: time="2025-10-31T01:08:01.567421752Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:08:01.568867 env[1209]: time="2025-10-31T01:08:01.568808294Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:08:01.569210 kubelet[1444]: E1031 01:08:01.569160 1444 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:08:01.569302 kubelet[1444]: E1031 01:08:01.569219 1444 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:08:01.569388 kubelet[1444]: E1031 01:08:01.569352 1444 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-7nphb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-8wv96_calico-system(329a10ac-4edf-49f3-88c8-aa1c4184c6de): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:08:01.570580 kubelet[1444]: E1031 01:08:01.570527 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:08:01.596981 kubelet[1444]: E1031 01:08:01.596920 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:01.601207 kubelet[1444]: E1031 01:08:01.601168 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:08:01.801955 systemd-networkd[1027]: cali7ab9a2ea71b: Gained IPv6LL Oct 31 01:08:02.517931 env[1209]: time="2025-10-31T01:08:02.517871236Z" level=info msg="StopPodSandbox for \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\"" Oct 31 01:08:02.597878 kubelet[1444]: E1031 01:08:02.597810 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:02.603237 kubelet[1444]: E1031 01:08:02.603178 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:02.995 [INFO][2469] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:02.995 [INFO][2469] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" iface="eth0" netns="/var/run/netns/cni-8cd7f289-a028-fd91-bec5-b56c14ceaf9e" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:02.995 [INFO][2469] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" iface="eth0" netns="/var/run/netns/cni-8cd7f289-a028-fd91-bec5-b56c14ceaf9e" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:02.996 [INFO][2469] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" iface="eth0" netns="/var/run/netns/cni-8cd7f289-a028-fd91-bec5-b56c14ceaf9e" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:02.996 [INFO][2469] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:02.996 [INFO][2469] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:03.018 [INFO][2484] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:03.018 [INFO][2484] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:03.018 [INFO][2484] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:03.049 [WARNING][2484] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:03.049 [INFO][2484] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:03.193 [INFO][2484] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:03.196545 env[1209]: 2025-10-31 01:08:03.194 [INFO][2469] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:03.197961 env[1209]: time="2025-10-31T01:08:03.197880584Z" level=info msg="TearDown network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\" successfully" Oct 31 01:08:03.197961 env[1209]: time="2025-10-31T01:08:03.197933624Z" level=info msg="StopPodSandbox for \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\" returns successfully" Oct 31 01:08:03.198362 systemd[1]: run-netns-cni\x2d8cd7f289\x2da028\x2dfd91\x2dbec5\x2db56c14ceaf9e.mount: Deactivated successfully. Oct 31 01:08:03.198846 env[1209]: time="2025-10-31T01:08:03.198817921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-84rfq,Uid:7d0bdec2-50e1-48ea-8509-63b518aaf340,Namespace:default,Attempt:1,}" Oct 31 01:08:03.598916 kubelet[1444]: E1031 01:08:03.598701 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:04.510601 systemd-networkd[1027]: caliad169ed9d41: Link UP Oct 31 01:08:04.514883 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:08:04.514995 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliad169ed9d41: link becomes ready Oct 31 01:08:04.515292 systemd-networkd[1027]: caliad169ed9d41: Gained carrier Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.272 [INFO][2495] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0 nginx-deployment-7fcdb87857- default 7d0bdec2-50e1-48ea-8509-63b518aaf340 1408 0 2025-10-31 01:07:47 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.30 nginx-deployment-7fcdb87857-84rfq eth0 default [] [] [kns.default ksa.default.default] caliad169ed9d41 [] [] }} ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.272 [INFO][2495] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.294 [INFO][2510] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" HandleID="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.294 [INFO][2510] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" HandleID="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004fdd0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.30", "pod":"nginx-deployment-7fcdb87857-84rfq", "timestamp":"2025-10-31 01:08:04.29447977 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.294 [INFO][2510] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.294 [INFO][2510] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.294 [INFO][2510] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.312 [INFO][2510] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.319 [INFO][2510] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.325 [INFO][2510] ipam/ipam.go 511: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.328 [INFO][2510] ipam/ipam.go 158: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.331 [INFO][2510] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.331 [INFO][2510] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.333 [INFO][2510] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732 Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.381 [INFO][2510] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.506 [INFO][2510] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.125.2/26] block=192.168.125.0/26 handle="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.506 [INFO][2510] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.125.2/26] handle="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" host="10.0.0.30" Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.506 [INFO][2510] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:04.527837 env[1209]: 2025-10-31 01:08:04.506 [INFO][2510] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.125.2/26] IPv6=[] ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" HandleID="k8s-pod-network.b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:04.528928 env[1209]: 2025-10-31 01:08:04.508 [INFO][2495] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7d0bdec2-50e1-48ea-8509-63b518aaf340", ResourceVersion:"1408", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-84rfq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliad169ed9d41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:04.528928 env[1209]: 2025-10-31 01:08:04.508 [INFO][2495] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.125.2/32] ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:04.528928 env[1209]: 2025-10-31 01:08:04.508 [INFO][2495] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliad169ed9d41 ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:04.528928 env[1209]: 2025-10-31 01:08:04.515 [INFO][2495] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:04.528928 env[1209]: 2025-10-31 01:08:04.515 [INFO][2495] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7d0bdec2-50e1-48ea-8509-63b518aaf340", ResourceVersion:"1408", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732", Pod:"nginx-deployment-7fcdb87857-84rfq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliad169ed9d41", MAC:"3a:8c:17:84:f1:90", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:04.528928 env[1209]: 2025-10-31 01:08:04.525 [INFO][2495] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732" Namespace="default" Pod="nginx-deployment-7fcdb87857-84rfq" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:04.537079 env[1209]: time="2025-10-31T01:08:04.537024375Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:08:04.537079 env[1209]: time="2025-10-31T01:08:04.537058881Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:08:04.537079 env[1209]: time="2025-10-31T01:08:04.537068208Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:08:04.536000 audit[2534]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:08:04.536000 audit[2534]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffc938e3310 a2=0 a3=7ffc938e32fc items=0 ppid=2145 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:04.536000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:08:04.537475 env[1209]: time="2025-10-31T01:08:04.537221499Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732 pid=2535 runtime=io.containerd.runc.v2 Oct 31 01:08:04.551335 systemd[1]: run-containerd-runc-k8s.io-b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732-runc.tGJmUF.mount: Deactivated successfully. Oct 31 01:08:04.555043 systemd[1]: Started cri-containerd-b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732.scope. Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.564000 audit: BPF prog-id=101 op=LOAD Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:04.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623333343037353136353962616136363038396531356439613231 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:04.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623333343037353136353962616136363038396531356439613231 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit: BPF prog-id=102 op=LOAD Oct 31 01:08:04.565000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038c680 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:04.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623333343037353136353962616136363038396531356439613231 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit: BPF prog-id=103 op=LOAD Oct 31 01:08:04.565000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038c6c8 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:04.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623333343037353136353962616136363038396531356439613231 Oct 31 01:08:04.565000 audit: BPF prog-id=103 op=UNLOAD Oct 31 01:08:04.565000 audit: BPF prog-id=102 op=UNLOAD Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:04.565000 audit: BPF prog-id=104 op=LOAD Oct 31 01:08:04.565000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038cad8 items=0 ppid=2535 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:04.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235623333343037353136353962616136363038396531356439613231 Oct 31 01:08:04.567468 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:08:04.573376 kubelet[1444]: E1031 01:08:04.573350 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:04.594265 env[1209]: time="2025-10-31T01:08:04.591666753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-84rfq,Uid:7d0bdec2-50e1-48ea-8509-63b518aaf340,Namespace:default,Attempt:1,} returns sandbox id \"b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732\"" Oct 31 01:08:04.594265 env[1209]: time="2025-10-31T01:08:04.592941648Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:08:04.599859 kubelet[1444]: E1031 01:08:04.599834 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:05.600894 kubelet[1444]: E1031 01:08:05.600829 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:06.218094 systemd-networkd[1027]: caliad169ed9d41: Gained IPv6LL Oct 31 01:08:06.602099 kubelet[1444]: E1031 01:08:06.601965 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:07.603008 kubelet[1444]: E1031 01:08:07.602935 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:08.604114 kubelet[1444]: E1031 01:08:08.604040 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:09.604584 kubelet[1444]: E1031 01:08:09.604513 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:09.835014 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2201925270.mount: Deactivated successfully. Oct 31 01:08:10.605063 kubelet[1444]: E1031 01:08:10.604972 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:11.605400 kubelet[1444]: E1031 01:08:11.605321 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:11.779866 env[1209]: time="2025-10-31T01:08:11.779786201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:11.784029 env[1209]: time="2025-10-31T01:08:11.783998610Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:11.787367 env[1209]: time="2025-10-31T01:08:11.787324867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:11.791703 env[1209]: time="2025-10-31T01:08:11.791640291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:11.792445 env[1209]: time="2025-10-31T01:08:11.792401537Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:08:11.795011 env[1209]: time="2025-10-31T01:08:11.794984773Z" level=info msg="CreateContainer within sandbox \"b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 31 01:08:11.813597 env[1209]: time="2025-10-31T01:08:11.813506376Z" level=info msg="CreateContainer within sandbox \"b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"18c2997d3931a57a86f2d7949b3ca05e5cfe5941cde90ad72cde62873de2b2e8\"" Oct 31 01:08:11.814230 env[1209]: time="2025-10-31T01:08:11.814192250Z" level=info msg="StartContainer for \"18c2997d3931a57a86f2d7949b3ca05e5cfe5941cde90ad72cde62873de2b2e8\"" Oct 31 01:08:11.835472 systemd[1]: Started cri-containerd-18c2997d3931a57a86f2d7949b3ca05e5cfe5941cde90ad72cde62873de2b2e8.scope. Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.848030 kernel: kauditd_printk_skb: 110 callbacks suppressed Oct 31 01:08:11.848115 kernel: audit: type=1400 audit(1761872891.845:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.859458 kernel: audit: type=1400 audit(1761872891.845:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.859554 kernel: audit: type=1400 audit(1761872891.845:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.873017 kernel: audit: type=1400 audit(1761872891.845:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.873220 kernel: audit: type=1400 audit(1761872891.845:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.879418 kernel: audit: type=1400 audit(1761872891.845:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.885187 kernel: audit: type=1400 audit(1761872891.845:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.890803 kernel: audit: type=1400 audit(1761872891.845:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.902101 kernel: audit: type=1400 audit(1761872891.845:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.902182 kernel: audit: type=1400 audit(1761872891.852:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.852000 audit: BPF prog-id=105 op=LOAD Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2535 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:11.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633239393764333933316135376138366632643739343962336361 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2535 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:11.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633239393764333933316135376138366632643739343962336361 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.853000 audit: BPF prog-id=106 op=LOAD Oct 31 01:08:11.853000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dfd10 items=0 ppid=2535 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:11.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633239393764333933316135376138366632643739343962336361 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.865000 audit: BPF prog-id=107 op=LOAD Oct 31 01:08:11.865000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000dfd58 items=0 ppid=2535 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:11.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633239393764333933316135376138366632643739343962336361 Oct 31 01:08:11.878000 audit: BPF prog-id=107 op=UNLOAD Oct 31 01:08:11.878000 audit: BPF prog-id=106 op=UNLOAD Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:11.878000 audit: BPF prog-id=108 op=LOAD Oct 31 01:08:11.878000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ca168 items=0 ppid=2535 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:11.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633239393764333933316135376138366632643739343962336361 Oct 31 01:08:11.924266 env[1209]: time="2025-10-31T01:08:11.924201656Z" level=info msg="StartContainer for \"18c2997d3931a57a86f2d7949b3ca05e5cfe5941cde90ad72cde62873de2b2e8\" returns successfully" Oct 31 01:08:12.606568 kubelet[1444]: E1031 01:08:12.606483 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:12.676348 kubelet[1444]: I1031 01:08:12.676264 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-84rfq" podStartSLOduration=18.475235868 podStartE2EDuration="25.6762426s" podCreationTimestamp="2025-10-31 01:07:47 +0000 UTC" firstStartedPulling="2025-10-31 01:08:04.592511603 +0000 UTC m=+40.338701354" lastFinishedPulling="2025-10-31 01:08:11.793518346 +0000 UTC m=+47.539708086" observedRunningTime="2025-10-31 01:08:12.675991106 +0000 UTC m=+48.422180886" watchObservedRunningTime="2025-10-31 01:08:12.6762426 +0000 UTC m=+48.422432350" Oct 31 01:08:13.606709 kubelet[1444]: E1031 01:08:13.606648 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:14.607805 kubelet[1444]: E1031 01:08:14.607705 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:15.135000 audit[2636]: NETFILTER_CFG table=filter:71 family=2 entries=26 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:08:15.135000 audit[2636]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc2ca60990 a2=0 a3=7ffc2ca6097c items=0 ppid=1620 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:08:15.147000 audit[2636]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:08:15.147000 audit[2636]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc2ca60990 a2=0 a3=0 items=0 ppid=1620 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:08:15.160000 audit[2638]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_rule pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:08:15.160000 audit[2638]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff24f77830 a2=0 a3=7fff24f7781c items=0 ppid=1620 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:08:15.164000 audit[2638]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:08:15.164000 audit[2638]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff24f77830 a2=0 a3=0 items=0 ppid=1620 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:08:15.183791 systemd[1]: Created slice kubepods-besteffort-pod05011b31_8f7b_4ba1_85a6_f133f492bcdb.slice. Oct 31 01:08:15.199556 kubelet[1444]: I1031 01:08:15.199486 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/05011b31-8f7b-4ba1-85a6-f133f492bcdb-data\") pod \"nfs-server-provisioner-0\" (UID: \"05011b31-8f7b-4ba1-85a6-f133f492bcdb\") " pod="default/nfs-server-provisioner-0" Oct 31 01:08:15.199556 kubelet[1444]: I1031 01:08:15.199536 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4cmnd\" (UniqueName: \"kubernetes.io/projected/05011b31-8f7b-4ba1-85a6-f133f492bcdb-kube-api-access-4cmnd\") pod \"nfs-server-provisioner-0\" (UID: \"05011b31-8f7b-4ba1-85a6-f133f492bcdb\") " pod="default/nfs-server-provisioner-0" Oct 31 01:08:15.487768 env[1209]: time="2025-10-31T01:08:15.487559371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:05011b31-8f7b-4ba1-85a6-f133f492bcdb,Namespace:default,Attempt:0,}" Oct 31 01:08:15.608181 kubelet[1444]: E1031 01:08:15.608069 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:15.653830 systemd-networkd[1027]: cali60e51b789ff: Link UP Oct 31 01:08:15.659065 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:08:15.659257 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Oct 31 01:08:15.659625 systemd-networkd[1027]: cali60e51b789ff: Gained carrier Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.553 [INFO][2640] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 05011b31-8f7b-4ba1-85a6-f133f492bcdb 1499 0 2025-10-31 01:08:15 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.30 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.553 [INFO][2640] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.594 [INFO][2655] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" HandleID="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Workload="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.594 [INFO][2655] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" HandleID="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Workload="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b4740), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.30", "pod":"nfs-server-provisioner-0", "timestamp":"2025-10-31 01:08:15.594671492 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.595 [INFO][2655] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.595 [INFO][2655] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.595 [INFO][2655] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.603 [INFO][2655] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.609 [INFO][2655] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.615 [INFO][2655] ipam/ipam.go 511: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.618 [INFO][2655] ipam/ipam.go 158: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.622 [INFO][2655] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.622 [INFO][2655] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.625 [INFO][2655] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272 Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.633 [INFO][2655] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.643 [INFO][2655] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.125.3/26] block=192.168.125.0/26 handle="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.643 [INFO][2655] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.125.3/26] handle="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" host="10.0.0.30" Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.643 [INFO][2655] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:15.682104 env[1209]: 2025-10-31 01:08:15.643 [INFO][2655] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.125.3/26] IPv6=[] ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" HandleID="k8s-pod-network.7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Workload="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:08:15.683364 env[1209]: 2025-10-31 01:08:15.649 [INFO][2640] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"05011b31-8f7b-4ba1-85a6-f133f492bcdb", ResourceVersion:"1499", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 8, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:15.683364 env[1209]: 2025-10-31 01:08:15.650 [INFO][2640] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.125.3/32] ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:08:15.683364 env[1209]: 2025-10-31 01:08:15.650 [INFO][2640] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:08:15.683364 env[1209]: 2025-10-31 01:08:15.661 [INFO][2640] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:08:15.683608 env[1209]: 2025-10-31 01:08:15.663 [INFO][2640] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"05011b31-8f7b-4ba1-85a6-f133f492bcdb", ResourceVersion:"1499", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 8, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"aa:b3:21:ec:99:62", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:15.683608 env[1209]: 2025-10-31 01:08:15.676 [INFO][2640] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Oct 31 01:08:15.696000 audit[2673]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:08:15.696000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffe09ed44a0 a2=0 a3=7ffe09ed448c items=0 ppid=2145 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.696000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:08:15.698823 env[1209]: time="2025-10-31T01:08:15.698314333Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:08:15.698823 env[1209]: time="2025-10-31T01:08:15.698452033Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:08:15.698823 env[1209]: time="2025-10-31T01:08:15.698483883Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:08:15.699056 env[1209]: time="2025-10-31T01:08:15.698964959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272 pid=2680 runtime=io.containerd.runc.v2 Oct 31 01:08:15.720161 systemd[1]: Started cri-containerd-7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272.scope. Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit: BPF prog-id=109 op=LOAD Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613664366235363236656633323863373034323762336332316338 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613664366235363236656633323863373034323762336332316338 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.740000 audit: BPF prog-id=110 op=LOAD Oct 31 01:08:15.740000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000232350 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613664366235363236656633323863373034323762336332316338 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit: BPF prog-id=111 op=LOAD Oct 31 01:08:15.741000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000232398 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613664366235363236656633323863373034323762336332316338 Oct 31 01:08:15.741000 audit: BPF prog-id=111 op=UNLOAD Oct 31 01:08:15.741000 audit: BPF prog-id=110 op=UNLOAD Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { perfmon } for pid=2690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:15.741000 audit: BPF prog-id=112 op=LOAD Oct 31 01:08:15.741000 audit[2690]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002327a8 items=0 ppid=2680 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:15.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613664366235363236656633323863373034323762336332316338 Oct 31 01:08:15.742746 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:08:15.775164 env[1209]: time="2025-10-31T01:08:15.775092921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:05011b31-8f7b-4ba1-85a6-f133f492bcdb,Namespace:default,Attempt:0,} returns sandbox id \"7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272\"" Oct 31 01:08:15.778939 env[1209]: time="2025-10-31T01:08:15.778888373Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Oct 31 01:08:16.313031 systemd[1]: run-containerd-runc-k8s.io-7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272-runc.am8NbQ.mount: Deactivated successfully. Oct 31 01:08:16.608546 kubelet[1444]: E1031 01:08:16.608401 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:17.098850 systemd-networkd[1027]: cali60e51b789ff: Gained IPv6LL Oct 31 01:08:17.609017 kubelet[1444]: E1031 01:08:17.608941 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:18.610237 kubelet[1444]: E1031 01:08:18.610136 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:18.675204 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount933429065.mount: Deactivated successfully. Oct 31 01:08:19.610617 kubelet[1444]: E1031 01:08:19.610550 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:20.611388 kubelet[1444]: E1031 01:08:20.611319 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:21.229516 env[1209]: time="2025-10-31T01:08:21.229447382Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:21.231414 env[1209]: time="2025-10-31T01:08:21.231370921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:21.233477 env[1209]: time="2025-10-31T01:08:21.233436017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:21.235249 env[1209]: time="2025-10-31T01:08:21.235201359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:21.235857 env[1209]: time="2025-10-31T01:08:21.235809683Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Oct 31 01:08:21.237221 env[1209]: time="2025-10-31T01:08:21.237184269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 01:08:21.238401 env[1209]: time="2025-10-31T01:08:21.238373346Z" level=info msg="CreateContainer within sandbox \"7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Oct 31 01:08:21.256961 env[1209]: time="2025-10-31T01:08:21.256884065Z" level=info msg="CreateContainer within sandbox \"7da6d6b5626ef328c70427b3c21c8f7dd65b17ed64cafbb5459d46ae954a5272\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c879ca37034f94eacaa2b8ea19e12b6cd7fc8a26b284ef2cef2ea305bd576ea6\"" Oct 31 01:08:21.257568 env[1209]: time="2025-10-31T01:08:21.257511376Z" level=info msg="StartContainer for \"c879ca37034f94eacaa2b8ea19e12b6cd7fc8a26b284ef2cef2ea305bd576ea6\"" Oct 31 01:08:21.279386 systemd[1]: Started cri-containerd-c879ca37034f94eacaa2b8ea19e12b6cd7fc8a26b284ef2cef2ea305bd576ea6.scope. Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.300715 kernel: kauditd_printk_skb: 119 callbacks suppressed Oct 31 01:08:21.300795 kernel: audit: type=1400 audit(1761872901.298:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313532 kernel: audit: type=1400 audit(1761872901.298:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313604 kernel: audit: type=1400 audit(1761872901.298:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.326613 kernel: audit: type=1400 audit(1761872901.298:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.326718 kernel: audit: type=1400 audit(1761872901.298:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.339985 kernel: audit: type=1400 audit(1761872901.298:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.340031 kernel: audit: type=1400 audit(1761872901.298:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.353095 kernel: audit: type=1400 audit(1761872901.298:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.353151 kernel: audit: type=1400 audit(1761872901.298:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.359567 kernel: audit: type=1400 audit(1761872901.306:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit: BPF prog-id=113 op=LOAD Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2680 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:21.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373963613337303334663934656163616132623865613139653132 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2680 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:21.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373963613337303334663934656163616132623865613139653132 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.306000 audit: BPF prog-id=114 op=LOAD Oct 31 01:08:21.306000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304b30 items=0 ppid=2680 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:21.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373963613337303334663934656163616132623865613139653132 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.313000 audit: BPF prog-id=115 op=LOAD Oct 31 01:08:21.313000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304b78 items=0 ppid=2680 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:21.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373963613337303334663934656163616132623865613139653132 Oct 31 01:08:21.319000 audit: BPF prog-id=115 op=UNLOAD Oct 31 01:08:21.319000 audit: BPF prog-id=114 op=UNLOAD Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:21.319000 audit: BPF prog-id=116 op=LOAD Oct 31 01:08:21.319000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000304f88 items=0 ppid=2680 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:21.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373963613337303334663934656163616132623865613139653132 Oct 31 01:08:21.369448 env[1209]: time="2025-10-31T01:08:21.368289781Z" level=info msg="StartContainer for \"c879ca37034f94eacaa2b8ea19e12b6cd7fc8a26b284ef2cef2ea305bd576ea6\" returns successfully" Oct 31 01:08:21.416000 audit[2761]: AVC avc: denied { search } for pid=2761 comm="rpcbind" name="crypto" dev="proc" ino=21950 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:08:21.416000 audit[2761]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f51a3f170c0 a2=0 a3=0 items=0 ppid=2744 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 key=(null) Oct 31 01:08:21.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Oct 31 01:08:21.458000 audit[2766]: AVC avc: denied { search } for pid=2766 comm="dbus-daemon" name="crypto" dev="proc" ino=21950 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:08:21.458000 audit[2766]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb0234bb0c0 a2=0 a3=0 items=0 ppid=2744 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 key=(null) Oct 31 01:08:21.458000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:08:21.460000 audit[2767]: AVC avc: denied { watch } for pid=2767 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536941 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c338,c615 tclass=dir permissive=0 Oct 31 01:08:21.460000 audit[2767]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56100dfb73b0 a2=2c8 a3=7fff2fcf7eac items=0 ppid=2744 pid=2767 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 key=(null) Oct 31 01:08:21.460000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Oct 31 01:08:21.463000 audit[2768]: AVC avc: denied { read } for pid=2768 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22890 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Oct 31 01:08:21.463000 audit[2768]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fbf57075320 a1=80000 a2=d a3=7ffc9ebbc6d0 items=0 ppid=2744 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 key=(null) Oct 31 01:08:21.463000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:08:21.464000 audit[2768]: AVC avc: denied { search } for pid=2768 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21950 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Oct 31 01:08:21.464000 audit[2768]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbf565c90c0 a2=0 a3=0 items=0 ppid=2744 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c615 key=(null) Oct 31 01:08:21.464000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Oct 31 01:08:21.611080 env[1209]: time="2025-10-31T01:08:21.610906026Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:08:21.612382 kubelet[1444]: E1031 01:08:21.612334 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:21.612715 kubelet[1444]: E1031 01:08:21.612658 1444 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:08:21.612799 env[1209]: time="2025-10-31T01:08:21.612415956Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 01:08:21.612842 kubelet[1444]: E1031 01:08:21.612720 1444 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 01:08:21.613019 kubelet[1444]: E1031 01:08:21.612962 1444 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-7nphb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-8wv96_calico-system(329a10ac-4edf-49f3-88c8-aa1c4184c6de): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 01:08:21.615841 env[1209]: time="2025-10-31T01:08:21.615799463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 01:08:21.661116 kubelet[1444]: I1031 01:08:21.661023 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.201960872 podStartE2EDuration="6.660998957s" podCreationTimestamp="2025-10-31 01:08:15 +0000 UTC" firstStartedPulling="2025-10-31 01:08:15.777914639 +0000 UTC m=+51.524104389" lastFinishedPulling="2025-10-31 01:08:21.236952724 +0000 UTC m=+56.983142474" observedRunningTime="2025-10-31 01:08:21.660747585 +0000 UTC m=+57.406937335" watchObservedRunningTime="2025-10-31 01:08:21.660998957 +0000 UTC m=+57.407188727" Oct 31 01:08:21.676000 audit[2786]: NETFILTER_CFG table=filter:76 family=2 entries=26 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:08:21.676000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe8c043ba0 a2=0 a3=7ffe8c043b8c items=0 ppid=1620 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:21.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:08:21.686000 audit[2786]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 01:08:21.686000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffe8c043ba0 a2=0 a3=7ffe8c043b8c items=0 ppid=1620 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:21.686000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 01:08:21.932190 env[1209]: time="2025-10-31T01:08:21.932123430Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 01:08:21.933402 env[1209]: time="2025-10-31T01:08:21.933351932Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 01:08:21.933689 kubelet[1444]: E1031 01:08:21.933584 1444 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:08:21.933784 kubelet[1444]: E1031 01:08:21.933702 1444 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 01:08:21.933950 kubelet[1444]: E1031 01:08:21.933861 1444 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-7nphb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-8wv96_calico-system(329a10ac-4edf-49f3-88c8-aa1c4184c6de): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 01:08:21.935160 kubelet[1444]: E1031 01:08:21.935104 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:08:22.613096 kubelet[1444]: E1031 01:08:22.613034 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:23.613640 kubelet[1444]: E1031 01:08:23.613537 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:24.572998 kubelet[1444]: E1031 01:08:24.572929 1444 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:24.614655 kubelet[1444]: E1031 01:08:24.614576 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:24.651173 env[1209]: time="2025-10-31T01:08:24.651127255Z" level=info msg="StopPodSandbox for \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\"" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.688 [WARNING][2797] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-csi--node--driver--8wv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"329a10ac-4edf-49f3-88c8-aa1c4184c6de", ResourceVersion:"1407", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34", Pod:"csi-node-driver-8wv96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7ab9a2ea71b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.688 [INFO][2797] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.688 [INFO][2797] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" iface="eth0" netns="" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.688 [INFO][2797] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.688 [INFO][2797] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.712 [INFO][2805] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.712 [INFO][2805] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.712 [INFO][2805] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.720 [WARNING][2805] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.720 [INFO][2805] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.722 [INFO][2805] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:24.727057 env[1209]: 2025-10-31 01:08:24.724 [INFO][2797] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.727057 env[1209]: time="2025-10-31T01:08:24.727059863Z" level=info msg="TearDown network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\" successfully" Oct 31 01:08:24.727057 env[1209]: time="2025-10-31T01:08:24.727101522Z" level=info msg="StopPodSandbox for \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\" returns successfully" Oct 31 01:08:24.728401 env[1209]: time="2025-10-31T01:08:24.728369085Z" level=info msg="RemovePodSandbox for \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\"" Oct 31 01:08:24.728467 env[1209]: time="2025-10-31T01:08:24.728409681Z" level=info msg="Forcibly stopping sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\"" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.762 [WARNING][2824] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-csi--node--driver--8wv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"329a10ac-4edf-49f3-88c8-aa1c4184c6de", ResourceVersion:"1407", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"e8c4acd18c2739a81ac3f16ae49c1a0e600ff730711cecbe8da58c8ee2806d34", Pod:"csi-node-driver-8wv96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7ab9a2ea71b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.762 [INFO][2824] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.762 [INFO][2824] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" iface="eth0" netns="" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.762 [INFO][2824] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.762 [INFO][2824] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.787 [INFO][2833] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.787 [INFO][2833] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.787 [INFO][2833] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.796 [WARNING][2833] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.796 [INFO][2833] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" HandleID="k8s-pod-network.7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Workload="10.0.0.30-k8s-csi--node--driver--8wv96-eth0" Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.798 [INFO][2833] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:24.801175 env[1209]: 2025-10-31 01:08:24.799 [INFO][2824] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf" Oct 31 01:08:24.801175 env[1209]: time="2025-10-31T01:08:24.801139577Z" level=info msg="TearDown network for sandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\" successfully" Oct 31 01:08:24.809716 env[1209]: time="2025-10-31T01:08:24.809643087Z" level=info msg="RemovePodSandbox \"7dcfdea2c9f3a164606e28959c69a3e9568b23aa0f6cb714b90f6e4dd9e095bf\" returns successfully" Oct 31 01:08:24.810426 env[1209]: time="2025-10-31T01:08:24.810397456Z" level=info msg="StopPodSandbox for \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\"" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.845 [WARNING][2851] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7d0bdec2-50e1-48ea-8509-63b518aaf340", ResourceVersion:"1470", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732", Pod:"nginx-deployment-7fcdb87857-84rfq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliad169ed9d41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.846 [INFO][2851] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.846 [INFO][2851] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" iface="eth0" netns="" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.846 [INFO][2851] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.846 [INFO][2851] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.866 [INFO][2859] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.867 [INFO][2859] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.867 [INFO][2859] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.874 [WARNING][2859] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.874 [INFO][2859] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.876 [INFO][2859] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:24.879019 env[1209]: 2025-10-31 01:08:24.877 [INFO][2851] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.879019 env[1209]: time="2025-10-31T01:08:24.878681521Z" level=info msg="TearDown network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\" successfully" Oct 31 01:08:24.879019 env[1209]: time="2025-10-31T01:08:24.878714023Z" level=info msg="StopPodSandbox for \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\" returns successfully" Oct 31 01:08:24.879542 env[1209]: time="2025-10-31T01:08:24.879332356Z" level=info msg="RemovePodSandbox for \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\"" Oct 31 01:08:24.879542 env[1209]: time="2025-10-31T01:08:24.879377631Z" level=info msg="Forcibly stopping sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\"" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.915 [WARNING][2877] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7d0bdec2-50e1-48ea-8509-63b518aaf340", ResourceVersion:"1470", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 7, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"b5b3340751659baa66089e15d9a21d1a4a7a9ce659e7af06d0b5e86ee970b732", Pod:"nginx-deployment-7fcdb87857-84rfq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliad169ed9d41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.916 [INFO][2877] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.916 [INFO][2877] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" iface="eth0" netns="" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.916 [INFO][2877] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.916 [INFO][2877] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.933 [INFO][2886] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.933 [INFO][2886] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.933 [INFO][2886] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.940 [WARNING][2886] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.940 [INFO][2886] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" HandleID="k8s-pod-network.446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Workload="10.0.0.30-k8s-nginx--deployment--7fcdb87857--84rfq-eth0" Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.941 [INFO][2886] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:24.944240 env[1209]: 2025-10-31 01:08:24.942 [INFO][2877] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127" Oct 31 01:08:24.944910 env[1209]: time="2025-10-31T01:08:24.944284335Z" level=info msg="TearDown network for sandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\" successfully" Oct 31 01:08:24.947803 env[1209]: time="2025-10-31T01:08:24.947777383Z" level=info msg="RemovePodSandbox \"446aff842f3346e02f0378b07982e1d972e592ed7caa9a68ff858e40d732f127\" returns successfully" Oct 31 01:08:25.615242 kubelet[1444]: E1031 01:08:25.615175 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:26.615804 kubelet[1444]: E1031 01:08:26.615741 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:27.616087 kubelet[1444]: E1031 01:08:27.616050 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:27.749657 kubelet[1444]: E1031 01:08:27.749614 1444 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 31 01:08:28.616757 kubelet[1444]: E1031 01:08:28.616668 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:29.616893 kubelet[1444]: E1031 01:08:29.616817 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:30.617314 kubelet[1444]: E1031 01:08:30.617233 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:31.111486 systemd[1]: Created slice kubepods-besteffort-podc8a39cf3_204d_4a52_8cf6_b7919e47ba3e.slice. Oct 31 01:08:31.284480 kubelet[1444]: I1031 01:08:31.284378 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-79d40285-8819-4360-b47f-2f0bea57ed63\" (UniqueName: \"kubernetes.io/nfs/c8a39cf3-204d-4a52-8cf6-b7919e47ba3e-pvc-79d40285-8819-4360-b47f-2f0bea57ed63\") pod \"test-pod-1\" (UID: \"c8a39cf3-204d-4a52-8cf6-b7919e47ba3e\") " pod="default/test-pod-1" Oct 31 01:08:31.284480 kubelet[1444]: I1031 01:08:31.284448 1444 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6prch\" (UniqueName: \"kubernetes.io/projected/c8a39cf3-204d-4a52-8cf6-b7919e47ba3e-kube-api-access-6prch\") pod \"test-pod-1\" (UID: \"c8a39cf3-204d-4a52-8cf6-b7919e47ba3e\") " pod="default/test-pod-1" Oct 31 01:08:31.401776 kernel: Failed to create system directory netfs Oct 31 01:08:31.401929 kernel: kauditd_printk_skb: 68 callbacks suppressed Oct 31 01:08:31.401966 kernel: audit: type=1400 audit(1761872911.397:733): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.401996 kernel: Failed to create system directory netfs Oct 31 01:08:31.397000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.402353 kernel: audit: type=1400 audit(1761872911.397:733): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.397000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.397000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.416434 kernel: Failed to create system directory netfs Oct 31 01:08:31.416529 kernel: audit: type=1400 audit(1761872911.397:733): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.416555 kernel: Failed to create system directory netfs Oct 31 01:08:31.421961 kernel: audit: type=1400 audit(1761872911.397:733): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.397000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.397000 audit[2927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=565022f755e0 a1=153bc a2=56500577e2b0 a3=5 items=0 ppid=499 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:31.397000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:08:31.441141 kernel: audit: type=1300 audit(1761872911.397:733): arch=c000003e syscall=175 success=yes exit=0 a0=565022f755e0 a1=153bc a2=56500577e2b0 a3=5 items=0 ppid=499 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:31.441311 kernel: audit: type=1327 audit(1761872911.397:733): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:08:31.441337 kernel: Failed to create system directory fscache Oct 31 01:08:31.441360 kernel: audit: type=1400 audit(1761872911.434:734): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.448577 kernel: Failed to create system directory fscache Oct 31 01:08:31.448698 kernel: audit: type=1400 audit(1761872911.434:734): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.449953 kernel: Failed to create system directory fscache Oct 31 01:08:31.455698 kernel: audit: type=1400 audit(1761872911.434:734): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.462659 kernel: Failed to create system directory fscache Oct 31 01:08:31.462710 kernel: audit: type=1400 audit(1761872911.434:734): avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.463906 kernel: Failed to create system directory fscache Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.472394 kernel: Failed to create system directory fscache Oct 31 01:08:31.472442 kernel: Failed to create system directory fscache Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.475129 kernel: Failed to create system directory fscache Oct 31 01:08:31.475167 kernel: Failed to create system directory fscache Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.477943 kernel: Failed to create system directory fscache Oct 31 01:08:31.477976 kernel: Failed to create system directory fscache Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.480635 kernel: Failed to create system directory fscache Oct 31 01:08:31.480680 kernel: Failed to create system directory fscache Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.434000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.483326 kernel: Failed to create system directory fscache Oct 31 01:08:31.434000 audit[2927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56502318a9c0 a1=4c0fc a2=56500577e2b0 a3=5 items=0 ppid=499 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:31.434000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:08:31.485754 kernel: FS-Cache: Loaded Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.515747 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.515801 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.518519 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.518598 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.521233 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.521284 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.523753 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.523788 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.526259 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.526316 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.528757 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.528806 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.531273 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.531320 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.533841 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.533893 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.536451 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.536505 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.539056 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.539108 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.541595 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.541644 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.544254 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.544311 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.545583 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.548158 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.548212 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.550847 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.550906 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.553807 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.554008 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.556391 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.556422 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.558930 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.558956 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.560190 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.561440 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.562704 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.565232 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.565288 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.567889 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.567932 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.570602 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.570649 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.573139 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.573195 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.575675 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.575710 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.578223 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.578269 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.580763 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.580827 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.583464 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.583657 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.586087 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.586144 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.587398 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.590170 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.590245 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.591489 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.592763 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.593996 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.596599 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.596747 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.599358 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.599438 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.601934 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.601997 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.604618 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.604681 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.605846 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.607148 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.608913 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.611719 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.611796 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.614659 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.614717 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.617601 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.617649 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.617685 kubelet[1444]: E1031 01:08:31.617656 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.620231 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.620277 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.621592 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.624200 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.624272 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.627129 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.627210 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.630032 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.630058 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.632812 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.632859 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.635541 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.635705 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.638039 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.638164 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.639271 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.640591 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.643116 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.643179 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.645593 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.645637 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.648120 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.648174 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.650677 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.650878 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.651895 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.655870 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.656156 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.658948 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.659001 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.661509 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.661556 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.662756 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.665297 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.665328 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.666717 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.669312 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.669351 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.671849 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.671878 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.674354 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.674395 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.676960 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.677067 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.679538 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.679601 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.680834 kernel: Failed to create system directory sunrpc Oct 31 01:08:31.504000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.693744 kernel: RPC: Registered named UNIX socket transport module. Oct 31 01:08:31.693823 kernel: RPC: Registered udp transport module. Oct 31 01:08:31.693839 kernel: RPC: Registered tcp transport module. Oct 31 01:08:31.694927 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Oct 31 01:08:31.504000 audit[2927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5650231d6ad0 a1=1a8274 a2=56500577e2b0 a3=5 items=6 ppid=499 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:31.504000 audit: CWD cwd="/" Oct 31 01:08:31.504000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:08:31.504000 audit: PATH item=1 name=(null) inode=24582 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:08:31.504000 audit: PATH item=2 name=(null) inode=24582 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:08:31.504000 audit: PATH item=3 name=(null) inode=24583 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:08:31.504000 audit: PATH item=4 name=(null) inode=24582 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:08:31.504000 audit: PATH item=5 name=(null) inode=24584 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 01:08:31.504000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.736450 kernel: Failed to create system directory nfs Oct 31 01:08:31.736536 kernel: Failed to create system directory nfs Oct 31 01:08:31.736559 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.739141 kernel: Failed to create system directory nfs Oct 31 01:08:31.739180 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.741889 kernel: Failed to create system directory nfs Oct 31 01:08:31.741933 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.744605 kernel: Failed to create system directory nfs Oct 31 01:08:31.744638 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.747204 kernel: Failed to create system directory nfs Oct 31 01:08:31.747265 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.749946 kernel: Failed to create system directory nfs Oct 31 01:08:31.749998 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.752937 kernel: Failed to create system directory nfs Oct 31 01:08:31.752981 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.756103 kernel: Failed to create system directory nfs Oct 31 01:08:31.756143 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.759053 kernel: Failed to create system directory nfs Oct 31 01:08:31.759242 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.761955 kernel: Failed to create system directory nfs Oct 31 01:08:31.761994 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.763495 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.766594 kernel: Failed to create system directory nfs Oct 31 01:08:31.766713 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.768126 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.771085 kernel: Failed to create system directory nfs Oct 31 01:08:31.771152 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.773903 kernel: Failed to create system directory nfs Oct 31 01:08:31.773943 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.776767 kernel: Failed to create system directory nfs Oct 31 01:08:31.776811 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.779743 kernel: Failed to create system directory nfs Oct 31 01:08:31.779834 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.782698 kernel: Failed to create system directory nfs Oct 31 01:08:31.782801 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.785633 kernel: Failed to create system directory nfs Oct 31 01:08:31.785695 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.788343 kernel: Failed to create system directory nfs Oct 31 01:08:31.788435 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.789750 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.792708 kernel: Failed to create system directory nfs Oct 31 01:08:31.792782 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.795689 kernel: Failed to create system directory nfs Oct 31 01:08:31.795745 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.798744 kernel: Failed to create system directory nfs Oct 31 01:08:31.798788 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.805298 kernel: Failed to create system directory nfs Oct 31 01:08:31.805342 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.807772 kernel: Failed to create system directory nfs Oct 31 01:08:31.807804 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.810344 kernel: Failed to create system directory nfs Oct 31 01:08:31.810407 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.812743 kernel: Failed to create system directory nfs Oct 31 01:08:31.812774 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.817837 kernel: Failed to create system directory nfs Oct 31 01:08:31.817880 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.820263 kernel: Failed to create system directory nfs Oct 31 01:08:31.820312 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.822842 kernel: Failed to create system directory nfs Oct 31 01:08:31.822877 kernel: Failed to create system directory nfs Oct 31 01:08:31.725000 audit[2927]: AVC avc: denied { confidentiality } for pid=2927 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.725000 audit[2927]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5650233f7c10 a1=16eb2c a2=56500577e2b0 a3=5 items=0 ppid=499 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:31.725000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Oct 31 01:08:31.848749 kernel: FS-Cache: Netfs 'nfs' registered for caching Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.893228 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.893305 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.893323 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.896106 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.896147 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.899084 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.899125 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.901933 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.901967 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.904786 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.904817 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.908712 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.908788 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.912038 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.912061 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.914936 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.914978 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.917438 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.917472 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.919875 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.919911 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.922347 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.922414 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.924810 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.924861 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.927241 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.927273 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.929706 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.929759 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.932118 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.932166 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.934625 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.934652 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.937051 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.937092 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.939524 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.939558 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.940757 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.943144 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.943166 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.945581 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.945603 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.947997 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.948040 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.950440 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.950482 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.952868 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.952906 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.955308 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.955348 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.957713 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.957772 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.960106 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.960154 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.962520 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.962566 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.964987 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.965029 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.967483 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.967526 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.970003 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.970044 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.972433 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.972467 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.974824 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.974861 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.977301 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.977350 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.979811 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.979860 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.982351 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.982416 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.984873 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.984924 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.002131 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.002180 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.004634 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.004689 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.007120 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.007154 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.009656 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.009700 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.012168 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.012207 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.014663 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.014704 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.017178 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.017235 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.019714 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.019778 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.022212 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.022255 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.024735 kernel: Failed to create system directory nfs4 Oct 31 01:08:32.024775 kernel: Failed to create system directory nfs4 Oct 31 01:08:31.878000 audit[2932]: AVC avc: denied { confidentiality } for pid=2932 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.166135 kernel: NFS: Registering the id_resolver key type Oct 31 01:08:32.166286 kernel: Key type id_resolver registered Oct 31 01:08:32.166303 kernel: Key type id_legacy registered Oct 31 01:08:31.878000 audit[2932]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f448ed65010 a1=2095c4 a2=55a4dc44f2b0 a3=5 items=0 ppid=499 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:31.878000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.188870 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.188918 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.188938 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.192169 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.192232 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.195671 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.195848 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.198752 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.198805 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.201997 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.202039 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.205289 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.205319 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.208663 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.210299 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.210354 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.213782 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.213824 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.217068 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.217133 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.220343 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.220401 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.223721 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.223800 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.227102 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.227146 kernel: Failed to create system directory rpcgss Oct 31 01:08:32.181000 audit[2933]: AVC avc: denied { confidentiality } for pid=2933 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 01:08:32.181000 audit[2933]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4ebd5ad010 a1=70bf4 a2=55cdf47d82b0 a3=5 items=0 ppid=499 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:32.181000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Oct 31 01:08:32.247001 nfsidmap[2941]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:08:32.249583 nfsidmap[2944]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Oct 31 01:08:32.259000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:08:32.259000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563ead6776f0 a2=10 a3=b5e6db3c27a4d77b items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:32.259000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:08:32.259000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:08:32.259000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:08:32.259000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563ead6776f0 a2=10 a3=b5e6db3c27a4d77b items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:32.259000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:08:32.259000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:08:32.259000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:08:32.259000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Oct 31 01:08:32.259000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563ead6776f0 a2=10 a3=b5e6db3c27a4d77b items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:32.259000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Oct 31 01:08:32.314576 env[1209]: time="2025-10-31T01:08:32.314515264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c8a39cf3-204d-4a52-8cf6-b7919e47ba3e,Namespace:default,Attempt:0,}" Oct 31 01:08:32.618575 kubelet[1444]: E1031 01:08:32.618493 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:33.077088 systemd-networkd[1027]: cali5ec59c6bf6e: Link UP Oct 31 01:08:33.084625 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 01:08:33.084753 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Oct 31 01:08:33.083777 systemd-networkd[1027]: cali5ec59c6bf6e: Gained carrier Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.726 [INFO][2947] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-test--pod--1-eth0 default c8a39cf3-204d-4a52-8cf6-b7919e47ba3e 1601 0 2025-10-31 01:08:15 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.30 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.726 [INFO][2947] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.763 [INFO][2962] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" HandleID="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Workload="10.0.0.30-k8s-test--pod--1-eth0" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.763 [INFO][2962] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" HandleID="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Workload="10.0.0.30-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00017e340), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.30", "pod":"test-pod-1", "timestamp":"2025-10-31 01:08:32.763315221 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.763 [INFO][2962] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.764 [INFO][2962] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.764 [INFO][2962] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.770 [INFO][2962] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.776 [INFO][2962] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.780 [INFO][2962] ipam/ipam.go 511: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.782 [INFO][2962] ipam/ipam.go 158: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.785 [INFO][2962] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.785 [INFO][2962] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:32.787 [INFO][2962] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:33.058 [INFO][2962] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:33.067 [INFO][2962] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.125.4/26] block=192.168.125.0/26 handle="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:33.067 [INFO][2962] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.125.4/26] handle="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" host="10.0.0.30" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:33.067 [INFO][2962] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:33.067 [INFO][2962] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.125.4/26] IPv6=[] ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" HandleID="k8s-pod-network.1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Workload="10.0.0.30-k8s-test--pod--1-eth0" Oct 31 01:08:33.100249 env[1209]: 2025-10-31 01:08:33.069 [INFO][2947] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c8a39cf3-204d-4a52-8cf6-b7919e47ba3e", ResourceVersion:"1601", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 8, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:33.101048 env[1209]: 2025-10-31 01:08:33.069 [INFO][2947] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.125.4/32] ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Oct 31 01:08:33.101048 env[1209]: 2025-10-31 01:08:33.069 [INFO][2947] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Oct 31 01:08:33.101048 env[1209]: 2025-10-31 01:08:33.085 [INFO][2947] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Oct 31 01:08:33.101048 env[1209]: 2025-10-31 01:08:33.085 [INFO][2947] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c8a39cf3-204d-4a52-8cf6-b7919e47ba3e", ResourceVersion:"1601", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 1, 8, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"9e:e4:39:05:7d:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 01:08:33.101048 env[1209]: 2025-10-31 01:08:33.098 [INFO][2947] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Oct 31 01:08:33.111000 audit[2986]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 01:08:33.111000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe5bb59a10 a2=0 a3=7ffe5bb599fc items=0 ppid=2145 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.111000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 01:08:33.114038 env[1209]: time="2025-10-31T01:08:33.113954100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 01:08:33.114038 env[1209]: time="2025-10-31T01:08:33.113996540Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 01:08:33.114038 env[1209]: time="2025-10-31T01:08:33.114009063Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 01:08:33.114220 env[1209]: time="2025-10-31T01:08:33.114166029Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df pid=2991 runtime=io.containerd.runc.v2 Oct 31 01:08:33.129839 systemd[1]: Started cri-containerd-1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df.scope. Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.140000 audit: BPF prog-id=117 op=LOAD Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2991 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303366303434623864333462346438323133323664353733363561 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2991 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303366303434623864333462346438323133323664353733363561 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit: BPF prog-id=118 op=LOAD Oct 31 01:08:33.141000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ee270 items=0 ppid=2991 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303366303434623864333462346438323133323664353733363561 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit: BPF prog-id=119 op=LOAD Oct 31 01:08:33.141000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ee2b8 items=0 ppid=2991 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303366303434623864333462346438323133323664353733363561 Oct 31 01:08:33.141000 audit: BPF prog-id=119 op=UNLOAD Oct 31 01:08:33.141000 audit: BPF prog-id=118 op=UNLOAD Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.141000 audit: BPF prog-id=120 op=LOAD Oct 31 01:08:33.141000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ee6c8 items=0 ppid=2991 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164303366303434623864333462346438323133323664353733363561 Oct 31 01:08:33.142956 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 31 01:08:33.167074 env[1209]: time="2025-10-31T01:08:33.167002507Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c8a39cf3-204d-4a52-8cf6-b7919e47ba3e,Namespace:default,Attempt:0,} returns sandbox id \"1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df\"" Oct 31 01:08:33.168648 env[1209]: time="2025-10-31T01:08:33.168594546Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 31 01:08:33.530452 env[1209]: time="2025-10-31T01:08:33.530386258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:33.532539 env[1209]: time="2025-10-31T01:08:33.532485000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:33.534372 env[1209]: time="2025-10-31T01:08:33.534295761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:33.536281 env[1209]: time="2025-10-31T01:08:33.536223612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 01:08:33.537089 env[1209]: time="2025-10-31T01:08:33.537056756Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:8d14817f00613fe76ef7459f977ad93e7b71a3948346b7ac4d50e35f3dd518e9\"" Oct 31 01:08:33.539525 env[1209]: time="2025-10-31T01:08:33.539500456Z" level=info msg="CreateContainer within sandbox \"1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df\" for container &ContainerMetadata{Name:test,Attempt:0,}" Oct 31 01:08:33.551473 env[1209]: time="2025-10-31T01:08:33.551418641Z" level=info msg="CreateContainer within sandbox \"1d03f044b8d34b4d821326d57365a057902742744f520a2e4aaf5192443ec7df\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0c43764353ad02d35011c38a3d84134f9011fe434812602ffcd4393aa6accbb7\"" Oct 31 01:08:33.551879 env[1209]: time="2025-10-31T01:08:33.551852847Z" level=info msg="StartContainer for \"0c43764353ad02d35011c38a3d84134f9011fe434812602ffcd4393aa6accbb7\"" Oct 31 01:08:33.565664 systemd[1]: Started cri-containerd-0c43764353ad02d35011c38a3d84134f9011fe434812602ffcd4393aa6accbb7.scope. Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.576000 audit: BPF prog-id=121 op=LOAD Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2991 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343337363433353361643032643335303131633338613364383431 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2991 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343337363433353361643032643335303131633338613364383431 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit: BPF prog-id=122 op=LOAD Oct 31 01:08:33.577000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dcc00 items=0 ppid=2991 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343337363433353361643032643335303131633338613364383431 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit: BPF prog-id=123 op=LOAD Oct 31 01:08:33.577000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dcc48 items=0 ppid=2991 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343337363433353361643032643335303131633338613364383431 Oct 31 01:08:33.577000 audit: BPF prog-id=123 op=UNLOAD Oct 31 01:08:33.577000 audit: BPF prog-id=122 op=UNLOAD Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 01:08:33.577000 audit: BPF prog-id=124 op=LOAD Oct 31 01:08:33.577000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dd058 items=0 ppid=2991 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 01:08:33.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343337363433353361643032643335303131633338613364383431 Oct 31 01:08:33.590543 env[1209]: time="2025-10-31T01:08:33.590488673Z" level=info msg="StartContainer for \"0c43764353ad02d35011c38a3d84134f9011fe434812602ffcd4393aa6accbb7\" returns successfully" Oct 31 01:08:33.618970 kubelet[1444]: E1031 01:08:33.618927 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:33.659767 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1122537044.mount: Deactivated successfully. Oct 31 01:08:33.685107 kubelet[1444]: I1031 01:08:33.685039 1444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.314820059 podStartE2EDuration="18.685015394s" podCreationTimestamp="2025-10-31 01:08:15 +0000 UTC" firstStartedPulling="2025-10-31 01:08:33.168030568 +0000 UTC m=+68.914220318" lastFinishedPulling="2025-10-31 01:08:33.538225903 +0000 UTC m=+69.284415653" observedRunningTime="2025-10-31 01:08:33.684963727 +0000 UTC m=+69.431153507" watchObservedRunningTime="2025-10-31 01:08:33.685015394 +0000 UTC m=+69.431205144" Oct 31 01:08:34.518484 kubelet[1444]: E1031 01:08:34.518423 1444 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-8wv96" podUID="329a10ac-4edf-49f3-88c8-aa1c4184c6de" Oct 31 01:08:34.619542 kubelet[1444]: E1031 01:08:34.619462 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:35.082052 systemd-networkd[1027]: cali5ec59c6bf6e: Gained IPv6LL Oct 31 01:08:35.619898 kubelet[1444]: E1031 01:08:35.619826 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:36.620042 kubelet[1444]: E1031 01:08:36.619965 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 31 01:08:37.621247 kubelet[1444]: E1031 01:08:37.621149 1444 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"